Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Client-base.exe

Overview

General Information

Sample name:Client-base.exe
Analysis ID:1589885
MD5:21ce4cd2ce246c86222b57b93cdc92bd
SHA1:9dc24ad846b2d9db64e5bbea1977e23bb185d224
SHA256:273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Quasar
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Client-base.exe (PID: 7656 cmdline: "C:\Users\user\Desktop\Client-base.exe" MD5: 21CE4CD2CE246C86222B57B93CDC92BD)
    • schtasks.exe (PID: 7692 cmdline: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "0.tcp.in.ngrok.io:14296;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "cc827307-beb6-456e-b5dd-e28a204ebd45", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
Client-base.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Client-base.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Client-base.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28eed7:$x1: Quasar.Common.Messages
      • 0x29f200:$x1: Quasar.Common.Messages
      • 0x2ab812:$x4: Uninstalling... good bye :-(
      • 0x2ad007:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Client-base.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadc4:$f1: FileZilla\recentservers.xml
      • 0x2aae04:$f2: FileZilla\sitemanager.xml
      • 0x2aae46:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab092:$b1: Chrome\User Data\
      • 0x2ab0e8:$b1: Chrome\User Data\
      • 0x2ab3c0:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4bc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd440:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab614:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6ce:$b5: YandexBrowser\User Data\
      • 0x2ab73c:$b5: YandexBrowser\User Data\
      • 0x2ab410:$s4: logins.json
      • 0x2ab146:$a1: username_value
      • 0x2ab164:$a2: password_value
      • 0x2ab450:$a3: encryptedUsername
      • 0x2fd384:$a3: encryptedUsername
      • 0x2ab474:$a4: encryptedPassword
      • 0x2fd3a2:$a4: encryptedPassword
      • 0x2fd320:$a5: httpRealm
      Client-base.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab8fc:$s3: Process already elevated.
      • 0x28ebd6:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c92:$s5: GetKeyloggerLogsDirectory
      • 0x29e95f:$s5: GetKeyloggerLogsDirectory
      • 0x28ebf9:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea6e:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.1775574902.000002140D1E0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000000.1758259602.0000000000820000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000001.00000002.1775347331.000000207E7F9000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000001.00000002.1775529562.000002140CEF0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              00000001.00000002.1775529562.000002140CEF8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                Click to see the 5 entries
                SourceRuleDescriptionAuthorStrings
                0.0.Client-base.exe.500000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  0.0.Client-base.exe.500000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.0.Client-base.exe.500000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                    • 0x28eed7:$x1: Quasar.Common.Messages
                    • 0x29f200:$x1: Quasar.Common.Messages
                    • 0x2ab812:$x4: Uninstalling... good bye :-(
                    • 0x2ad007:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                    0.0.Client-base.exe.500000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                    • 0x2aadc4:$f1: FileZilla\recentservers.xml
                    • 0x2aae04:$f2: FileZilla\sitemanager.xml
                    • 0x2aae46:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                    • 0x2ab092:$b1: Chrome\User Data\
                    • 0x2ab0e8:$b1: Chrome\User Data\
                    • 0x2ab3c0:$b2: Mozilla\Firefox\Profiles
                    • 0x2ab4bc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0x2fd440:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0x2ab614:$b4: Opera Software\Opera Stable\Login Data
                    • 0x2ab6ce:$b5: YandexBrowser\User Data\
                    • 0x2ab73c:$b5: YandexBrowser\User Data\
                    • 0x2ab410:$s4: logins.json
                    • 0x2ab146:$a1: username_value
                    • 0x2ab164:$a2: password_value
                    • 0x2ab450:$a3: encryptedUsername
                    • 0x2fd384:$a3: encryptedUsername
                    • 0x2ab474:$a4: encryptedPassword
                    • 0x2fd3a2:$a4: encryptedPassword
                    • 0x2fd320:$a5: httpRealm
                    0.0.Client-base.exe.500000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                    • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                    • 0x2ab8fc:$s3: Process already elevated.
                    • 0x28ebd6:$s4: get_PotentiallyVulnerablePasswords
                    • 0x278c92:$s5: GetKeyloggerLogsDirectory
                    • 0x29e95f:$s5: GetKeyloggerLogsDirectory
                    • 0x28ebf9:$s6: set_PotentiallyVulnerablePasswords
                    • 0x2fea6e:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                    AV Detection

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Client-base.exe", ParentImage: C:\Users\user\Desktop\Client-base.exe, ParentProcessId: 7656, ParentProcessName: Client-base.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7692, ProcessName: schtasks.exe

                    E-Banking Fraud

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Client-base.exe", ParentImage: C:\Users\user\Desktop\Client-base.exe, ParentProcessId: 7656, ParentProcessName: Client-base.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7692, ProcessName: schtasks.exe

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Client-base.exe", ParentImage: C:\Users\user\Desktop\Client-base.exe, ParentProcessId: 7656, ParentProcessName: Client-base.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7692, ProcessName: schtasks.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Client-base.exe", ParentImage: C:\Users\user\Desktop\Client-base.exe, ParentProcessId: 7656, ParentProcessName: Client-base.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7692, ProcessName: schtasks.exe

                    Remote Access Functionality

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Client-base.exe", ParentImage: C:\Users\user\Desktop\Client-base.exe, ParentProcessId: 7656, ParentProcessName: Client-base.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7692, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Client-base.exeAvira: detected
                    Source: 0.tcp.in.ngrok.ioAvira URL Cloud: Label: malware
                    Source: Client-base.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "0.tcp.in.ngrok.io:14296;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "cc827307-beb6-456e-b5dd-e28a204ebd45", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                    Source: Client-base.exeVirustotal: Detection: 75%Perma Link
                    Source: Client-base.exeReversingLabs: Detection: 76%
                    Source: Yara matchFile source: Client-base.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1775574902.000002140D1E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1758259602.0000000000820000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775347331.000000207E7F9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775529562.000002140CEF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775529562.000002140CEF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775574902.000002140D1E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4214131861.0000000002B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1757918698.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Client-base.exe PID: 7656, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 7692, type: MEMORYSTR
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: Client-base.exeJoe Sandbox ML: detected
                    Source: Client-base.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Client-base.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 0.tcp.in.ngrok.io
                    Source: global trafficTCP traffic: 3.6.231.193 ports 14296,1,2,4,6,9
                    Source: global trafficTCP traffic: 13.202.226.61 ports 14296,1,2,4,6,9
                    Source: Yara matchFile source: Client-base.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 3.6.231.193:14296
                    Source: global trafficTCP traffic: 192.168.2.4:49834 -> 13.202.226.61:14296
                    Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                    Source: Joe Sandbox ViewASN Name: ATT-INTERNET4US ATT-INTERNET4US
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: 0.tcp.in.ngrok.io
                    Source: Client-base.exe, 00000000.00000002.4214131861.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Client-base.exeString found in binary or memory: https://api.ipify.org/
                    Source: Client-base.exeString found in binary or memory: https://ipwho.is/
                    Source: Client-base.exeString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: Client-base.exeString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: Client-base.exeString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\Desktop\Client-base.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Client-base.exeJump to behavior

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: Client-base.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1775574902.000002140D1E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1758259602.0000000000820000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775347331.000000207E7F9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775529562.000002140CEF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775529562.000002140CEF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775574902.000002140D1E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4214131861.0000000002B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1757918698.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Client-base.exe PID: 7656, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 7692, type: MEMORYSTR

                    System Summary

                    barindex
                    Source: Client-base.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: Client-base.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: Client-base.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Users\user\Desktop\Client-base.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B7018670_2_00007FFD9B701867
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B96AFDD0_2_00007FFD9B96AFDD
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B969BD10_2_00007FFD9B969BD1
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B9655D60_2_00007FFD9B9655D6
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B9692710_2_00007FFD9B969271
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B96621F0_2_00007FFD9B96621F
                    Source: Client-base.exe, 00000000.00000000.1758259602.0000000000820000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Client-base.exe
                    Source: Client-base.exeBinary or memory string: OriginalFilenameClient.exe. vs Client-base.exe
                    Source: Client-base.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Client-base.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: Client-base.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: Client-base.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@5/2
                    Source: C:\Users\user\Desktop\Client-base.exeMutant created: \Sessions\1\BaseNamedObjects\Local\cc827307-beb6-456e-b5dd-e28a204ebd45
                    Source: C:\Users\user\Desktop\Client-base.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7700:120:WilError_03
                    Source: Client-base.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Client-base.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\Client-base.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Client-base.exeVirustotal: Detection: 75%
                    Source: Client-base.exeReversingLabs: Detection: 76%
                    Source: Client-base.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                    Source: unknownProcess created: C:\Users\user\Desktop\Client-base.exe "C:\Users\user\Desktop\Client-base.exe"
                    Source: C:\Users\user\Desktop\Client-base.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Client-base.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: Client-base.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Client-base.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: Client-base.exeStatic file information: File size 3266048 > 1048576
                    Source: Client-base.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c600
                    Source: Client-base.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B6F2B85 pushad ; iretd 0_2_00007FFD9B6F2C3D
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B6F2BE5 pushad ; iretd 0_2_00007FFD9B6F2C3D
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B6F00AD pushad ; iretd 0_2_00007FFD9B6F00C1
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B96336E push eax; ret 0_2_00007FFD9B96340C

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Client-base.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\Client-base.exeFile opened: C:\Users\user\Desktop\Client-base.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeMemory allocated: E60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeMemory allocated: 1AB30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeCode function: 0_2_00007FFD9B6FF1F2 str ax0_2_00007FFD9B6FF1F2
                    Source: C:\Users\user\Desktop\Client-base.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeWindow / User API: threadDelayed 7956Jump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeWindow / User API: threadDelayed 1912Jump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exe TID: 7796Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Client-base.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Client-base.exe, 00000000.00000002.4216323046.000000001B791000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
                    Source: C:\Users\user\Desktop\Client-base.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeQueries volume information: C:\Users\user\Desktop\Client-base.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Client-base.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: Client-base.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1775574902.000002140D1E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1758259602.0000000000820000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775347331.000000207E7F9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775529562.000002140CEF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775529562.000002140CEF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775574902.000002140D1E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4214131861.0000000002B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1757918698.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Client-base.exe PID: 7656, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 7692, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: Client-base.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Client-base.exe.500000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1775574902.000002140D1E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1758259602.0000000000820000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775347331.000000207E7F9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775529562.000002140CEF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775529562.000002140CEF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1775574902.000002140D1E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4214131861.0000000002B31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1757918698.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Client-base.exe PID: 7656, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 7692, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    1
                    Disable or Modify Tools
                    11
                    Input Capture
                    1
                    Security Software Discovery
                    Remote Services11
                    Input Capture
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    41
                    Virtualization/Sandbox Evasion
                    LSASS Memory41
                    Virtualization/Sandbox Evasion
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    11
                    Process Injection
                    Security Account Manager1
                    Application Window Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Hidden Files and Directories
                    NTDS12
                    System Information Discovery
                    Distributed Component Object ModelInput Capture11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Obfuscated Files or Information
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Client-base.exe75%VirustotalBrowse
                    Client-base.exe76%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                    Client-base.exe100%AviraHEUR/AGEN.1307453
                    Client-base.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    0.tcp.in.ngrok.io100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    0.tcp.in.ngrok.io
                    3.6.231.193
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      0.tcp.in.ngrok.iotrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/Client-base.exefalse
                        high
                        https://stackoverflow.com/q/14436606/23354Client-base.exefalse
                          high
                          https://stackoverflow.com/q/2152978/23354sCannotClient-base.exefalse
                            high
                            https://ipwho.is/Client-base.exefalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameClient-base.exe, 00000000.00000002.4214131861.0000000002B31000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;Client-base.exefalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  3.6.231.193
                                  0.tcp.in.ngrok.ioUnited States
                                  16509AMAZON-02UStrue
                                  13.202.226.61
                                  unknownUnited States
                                  7018ATT-INTERNET4UStrue
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1589885
                                  Start date and time:2025-01-13 09:43:13 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 6m 42s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:7
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Client-base.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@4/0@5/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 98%
                                  • Number of executed functions: 9
                                  • Number of non-executed functions: 2
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  TimeTypeDescription
                                  03:44:16API Interceptor13902038x Sleep call for process: Client-base.exe modified
                                  08:44:15Task SchedulerRun new task: Quasar Client Startup path: C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  13.202.226.61Client.exeGet hashmaliciousAsyncRATBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    0.tcp.in.ngrok.ioClient.exeGet hashmaliciousAsyncRATBrowse
                                    • 35.154.189.194
                                    CV.vbsGet hashmaliciousXmrigBrowse
                                    • 3.6.115.64
                                    RobloxCheats.exeGet hashmaliciousUnknownBrowse
                                    • 3.6.98.232
                                    kuEfaZxkiY.exeGet hashmaliciousRedLineBrowse
                                    • 3.6.115.182
                                    ae6T8jJueq.exeGet hashmaliciousNjratBrowse
                                    • 3.6.115.64
                                    nOZ2Oqnzbz.exeGet hashmaliciousNjratBrowse
                                    • 3.6.115.64
                                    iR2UtZj5vP.exeGet hashmaliciousNjratBrowse
                                    • 3.6.122.107
                                    ZB7Ot9MOic.exeGet hashmaliciousNjratBrowse
                                    • 3.6.30.85
                                    etJZk4UQhS.exeGet hashmaliciousNjratBrowse
                                    • 3.6.122.107
                                    jango.exeGet hashmaliciousXWormBrowse
                                    • 3.6.30.85
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ATT-INTERNET4US4.elfGet hashmaliciousUnknownBrowse
                                    • 12.213.172.7
                                    6.elfGet hashmaliciousUnknownBrowse
                                    • 107.207.67.247
                                    boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                    • 216.9.225.175
                                    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                    • 216.9.225.175
                                    boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                    • 216.9.225.175
                                    boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                    • 216.9.225.175
                                    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                    • 216.9.225.175
                                    boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 216.9.225.175
                                    boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                    • 216.9.225.175
                                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                    • 216.9.225.175
                                    AMAZON-02USCSZ inquiry for MH raw material.exeGet hashmaliciousFormBookBrowse
                                    • 18.139.62.226
                                    arm5.elfGet hashmaliciousMiraiBrowse
                                    • 54.171.230.55
                                    trow.exeGet hashmaliciousUnknownBrowse
                                    • 3.65.101.129
                                    https://link.mail.beehiiv.com/ss/c/u001.dSnm3kaGd0BkNqLYPjeMfxWXllAYaBQ5sAn4OVD0j89GQGPZtwQlLugE_8c0wQMKfkpy5_wJ66BvE1Ognfzf5MlQMAeZ1qYs5mgwUBu3TAc6279Q43ISHz-HkVRC08yeDA4QvKWsqLTI1us9a0eXx18qeAibsZhjMMPvES-iG2zoVABKcwKIVWyx95VTVcFMSh6AEN3OCUfP_rXFvjKRbIPMuhn_dqYr8yUBKJvhhlJR9FhTpZPAULxzMbsYWp8k/4cu/JfECY1HwRl-ipvrNOktVcw/h23/h001.ibQl2N4tDD79TTzErix_sFWEGLTTuM6dTVMrTg3y5DkGet hashmaliciousUnknownBrowse
                                    • 18.245.46.55
                                    https://mrohailkhan.com/energyaustralia/auth/auhs1/Get hashmaliciousUnknownBrowse
                                    • 3.163.248.4
                                    https://app-nadexlxogi.webflow.io/Get hashmaliciousUnknownBrowse
                                    • 18.244.20.221
                                    https://upholl-xlognusa.godaddysites.com/Get hashmaliciousUnknownBrowse
                                    • 13.248.243.5
                                    https://informed.deliveryerz.top/us/Get hashmaliciousUnknownBrowse
                                    • 99.86.8.175
                                    na.elfGet hashmaliciousPrometeiBrowse
                                    • 54.171.230.55
                                    https://informed.deliveryerw.top/us/Get hashmaliciousUnknownBrowse
                                    • 99.86.8.175
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):6.0835542937018205
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:Client-base.exe
                                    File size:3'266'048 bytes
                                    MD5:21ce4cd2ce246c86222b57b93cdc92bd
                                    SHA1:9dc24ad846b2d9db64e5bbea1977e23bb185d224
                                    SHA256:273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
                                    SHA512:ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6
                                    SSDEEP:49152:DvTI22SsaNYfdPBldt698dBcjHZqS71J/ioGdRTTHHB72eh2NT:Dvs22SsaNYfdPBldt6+dBcjHZqSOB
                                    TLSH:95E54A1437F85E23E1BBE273D5B0041267F1EC2AB3A3FB5B6181677A1C53B505841AAB
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x71e3fe
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3a80x53.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x31c4040x31c600756a71c4d52d2cbb7cc09522cafcfda7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x3220000xc0x200e7d4f7d5c6a56813a995215f35c1a9ceFalse0.041015625data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x3200a00x31cdata0.4484924623115578
                                    RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 13, 2025 09:44:17.411304951 CET4973014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:17.416174889 CET14296497303.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:17.416245937 CET4973014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:17.427926064 CET4973014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:17.432707071 CET14296497303.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:19.387123108 CET14296497303.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:19.387351990 CET4973014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:19.403001070 CET4973014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:19.408365965 CET14296497303.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:22.714289904 CET4973114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:22.719505072 CET14296497313.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:22.719640970 CET4973114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:22.719950914 CET4973114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:22.727619886 CET14296497313.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:24.700129986 CET14296497313.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:24.700261116 CET4973114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:24.701061010 CET4973114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:24.705965996 CET14296497313.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:28.120378017 CET4973214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:28.125366926 CET14296497323.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:28.125446081 CET4973214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:28.125722885 CET4973214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:28.130692959 CET14296497323.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:30.105432034 CET14296497323.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:30.105483055 CET4973214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:30.105932951 CET4973214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:30.111339092 CET14296497323.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:33.863775015 CET4973814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:33.868680954 CET14296497383.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:33.870426893 CET4973814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:33.876322031 CET4973814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:33.881165981 CET14296497383.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:35.837191105 CET14296497383.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:35.837258101 CET4973814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:35.837879896 CET4973814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:35.842617989 CET14296497383.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:39.464438915 CET4974014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:39.469439983 CET14296497403.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:39.469568968 CET4974014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:39.469890118 CET4974014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:39.474678993 CET14296497403.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:41.429713011 CET14296497403.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:41.429893017 CET4974014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:41.430315971 CET4974014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:41.435215950 CET14296497403.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:44.994959116 CET4974114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:44.999809980 CET14296497413.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:45.000027895 CET4974114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:45.000236988 CET4974114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:45.004973888 CET14296497413.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:46.962838888 CET14296497413.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:46.962908030 CET4974114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:46.963540077 CET4974114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:46.968287945 CET14296497413.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:50.714276075 CET4974214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:50.719149113 CET14296497423.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:50.719299078 CET4974214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:50.719747066 CET4974214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:50.724559069 CET14296497423.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:52.679907084 CET14296497423.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:52.679992914 CET4974214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:52.680416107 CET4974214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:52.685271978 CET14296497423.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:56.120233059 CET4974314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:56.125138998 CET14296497433.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:56.125225067 CET4974314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:56.125607014 CET4974314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:56.130386114 CET14296497433.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:58.105225086 CET14296497433.6.231.193192.168.2.4
                                    Jan 13, 2025 09:44:58.105329037 CET4974314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:58.105747938 CET4974314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:44:58.110570908 CET14296497433.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:01.604569912 CET4974414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:01.609456062 CET14296497443.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:01.609601974 CET4974414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:01.610018969 CET4974414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:01.614814043 CET14296497443.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:03.571378946 CET14296497443.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:03.571441889 CET4974414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:03.571753979 CET4974414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:03.576565981 CET14296497443.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:07.041971922 CET4976614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:07.053670883 CET14296497663.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:07.053805113 CET4976614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:07.054110050 CET4976614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:07.061526060 CET14296497663.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:09.024365902 CET14296497663.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:09.028529882 CET4976614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:09.028837919 CET4976614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:09.033694029 CET14296497663.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:12.635801077 CET4980314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:12.802450895 CET14296498033.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:12.802598953 CET4980314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:12.803018093 CET4980314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:12.807781935 CET14296498033.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:14.777056932 CET14296498033.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:14.777134895 CET4980314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:14.777565002 CET4980314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:45:14.782478094 CET14296498033.6.231.193192.168.2.4
                                    Jan 13, 2025 09:45:17.924717903 CET4983414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:17.929616928 CET142964983413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:17.929752111 CET4983414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:17.930083036 CET4983414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:17.934959888 CET142964983413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:19.904155016 CET142964983413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:19.904227018 CET4983414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:19.904813051 CET4983414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:19.909553051 CET142964983413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:22.651352882 CET4987014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:22.656342030 CET142964987013.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:22.658801079 CET4987014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:22.659120083 CET4987014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:22.663871050 CET142964987013.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:24.619626045 CET142964987013.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:24.623455048 CET4987014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:24.623857975 CET4987014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:24.628631115 CET142964987013.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:27.262165070 CET4989614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:27.266994953 CET142964989613.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:27.267061949 CET4989614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:27.267405033 CET4989614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:27.272162914 CET142964989613.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:29.242650032 CET142964989613.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:29.242744923 CET4989614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:29.243056059 CET4989614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:29.247857094 CET142964989613.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:31.513829947 CET4992214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:31.519206047 CET142964992213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:31.519305944 CET4992214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:31.527815104 CET4992214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:31.532586098 CET142964992213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:33.495729923 CET142964992213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:33.495815992 CET4992214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:33.496371984 CET4992214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:33.501137972 CET142964992213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:35.495346069 CET4995214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:35.500189066 CET142964995213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:35.500261068 CET4995214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:35.500710011 CET4995214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:35.505475044 CET142964995213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:37.481569052 CET142964995213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:37.481637001 CET4995214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:37.482093096 CET4995214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:37.486838102 CET142964995213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:39.151274920 CET4997414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:39.156270027 CET142964997413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:39.156471014 CET4997414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:39.156858921 CET4997414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:39.161689043 CET142964997413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:41.120682001 CET142964997413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:41.124552011 CET4997414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:41.128297091 CET4997414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:41.133183956 CET142964997413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:42.791968107 CET4999714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:42.797593117 CET142964999713.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:42.797780037 CET4999714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:42.798104048 CET4999714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:42.803373098 CET142964999713.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:44.760834932 CET142964999713.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:44.760982990 CET4999714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:44.761269093 CET4999714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:44.766089916 CET142964999713.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:46.343951941 CET5001814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:46.529267073 CET142965001813.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:46.529433012 CET5001814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:46.532365084 CET5001814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:46.537267923 CET142965001813.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:48.493828058 CET142965001813.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:48.496541023 CET5001814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:48.500288963 CET5001814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:48.505202055 CET142965001813.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:49.746184111 CET5002114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:49.751247883 CET142965002113.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:49.751348972 CET5002114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:49.756905079 CET5002114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:49.761842012 CET142965002113.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:51.734577894 CET142965002113.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:51.734644890 CET5002114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:51.735162020 CET5002114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:51.739975929 CET142965002113.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:53.018695116 CET5002214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:53.023711920 CET142965002213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:53.026510000 CET5002214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:53.031235933 CET5002214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:53.036293983 CET142965002213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:54.994107008 CET142965002213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:54.994201899 CET5002214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:54.998389006 CET5002214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:55.004045963 CET142965002213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:55.995322943 CET5002314296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:56.000648022 CET142965002313.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:56.000732899 CET5002314296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:56.001025915 CET5002314296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:56.005852938 CET142965002313.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:57.997643948 CET142965002313.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:57.997706890 CET5002314296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:57.998238087 CET5002314296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:58.003074884 CET142965002313.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:58.887284040 CET5002414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:58.892420053 CET142965002413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:45:58.896465063 CET5002414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:58.896967888 CET5002414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:45:58.901782036 CET142965002413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:46:00.855247974 CET142965002413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:46:00.858064890 CET5002414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:46:00.860071898 CET5002414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:46:00.865755081 CET142965002413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:46:01.589132071 CET5002514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:46:01.594512939 CET142965002513.202.226.61192.168.2.4
                                    Jan 13, 2025 09:46:01.594603062 CET5002514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:46:01.595033884 CET5002514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:46:01.599880934 CET142965002513.202.226.61192.168.2.4
                                    Jan 13, 2025 09:46:03.576878071 CET142965002513.202.226.61192.168.2.4
                                    Jan 13, 2025 09:46:03.576936960 CET5002514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:46:03.577438116 CET5002514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:46:03.582221031 CET142965002513.202.226.61192.168.2.4
                                    Jan 13, 2025 09:46:04.278155088 CET5002614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:04.283008099 CET14296500263.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:04.283130884 CET5002614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:04.283463001 CET5002614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:04.288309097 CET14296500263.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:06.264954090 CET14296500263.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:06.265043974 CET5002614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:06.265412092 CET5002614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:06.270224094 CET14296500263.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:06.823018074 CET5002714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:06.828021049 CET14296500273.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:06.828136921 CET5002714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:06.832268953 CET5002714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:06.837022066 CET14296500273.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:08.790282011 CET14296500273.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:08.790416002 CET5002714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:08.794961929 CET5002714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:08.799807072 CET14296500273.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:09.465754032 CET5002814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:09.470957994 CET14296500283.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:09.471045017 CET5002814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:09.471468925 CET5002814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:09.476298094 CET14296500283.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:11.432840109 CET14296500283.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:11.432935953 CET5002814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:11.433542967 CET5002814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:11.438404083 CET14296500283.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:11.932143927 CET5002914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:11.937285900 CET14296500293.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:11.937376976 CET5002914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:11.940789938 CET5002914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:11.945687056 CET14296500293.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:13.951294899 CET14296500293.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:13.951373100 CET5002914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:13.951843977 CET5002914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:13.956676960 CET14296500293.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:14.370165110 CET5003014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:14.375247955 CET14296500303.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:14.376398087 CET5003014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:14.380265951 CET5003014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:14.385201931 CET14296500303.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:16.337091923 CET14296500303.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:16.337153912 CET5003014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:16.339174032 CET5003014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:16.343988895 CET14296500303.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:16.746524096 CET5003114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:16.751450062 CET14296500313.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:16.751898050 CET5003114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:16.760164022 CET5003114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:16.764991999 CET14296500313.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:18.733644962 CET14296500313.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:18.733794928 CET5003114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:18.734230995 CET5003114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:18.739088058 CET14296500313.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:19.042654991 CET5003214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:19.047704935 CET14296500323.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:19.047847986 CET5003214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:19.048440933 CET5003214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:19.053261995 CET14296500323.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:21.030752897 CET14296500323.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:21.030846119 CET5003214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:21.031347990 CET5003214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:21.036221027 CET14296500323.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:21.323059082 CET5003314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:21.327930927 CET14296500333.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:21.328042030 CET5003314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:21.328457117 CET5003314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:21.333308935 CET14296500333.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:23.309794903 CET14296500333.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:23.309990883 CET5003314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:23.311167002 CET5003314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:23.315946102 CET14296500333.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:23.557770967 CET5003414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:23.562664032 CET14296500343.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:23.562753916 CET5003414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:23.563249111 CET5003414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:23.568031073 CET14296500343.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:25.526263952 CET14296500343.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:25.526352882 CET5003414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:25.527266979 CET5003414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:25.532170057 CET14296500343.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:25.761537075 CET5003514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:25.779735088 CET14296500353.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:25.779834032 CET5003514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:25.780529976 CET5003514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:25.785329103 CET14296500353.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:27.785871029 CET14296500353.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:27.785938025 CET5003514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:27.786449909 CET5003514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:27.791191101 CET14296500353.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:27.979943991 CET5003614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:27.984810114 CET14296500363.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:27.984884977 CET5003614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:27.985378981 CET5003614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:27.990266085 CET14296500363.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:29.966152906 CET14296500363.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:29.966249943 CET5003614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:29.966722012 CET5003614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:29.971514940 CET14296500363.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:30.135667086 CET5003714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:30.140573978 CET14296500373.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:30.140651941 CET5003714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:30.140964031 CET5003714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:30.145735025 CET14296500373.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:32.103723049 CET14296500373.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:32.103791952 CET5003714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:32.104176044 CET5003714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:32.109011889 CET14296500373.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:32.261888981 CET5003814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:32.266920090 CET14296500383.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:32.267002106 CET5003814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:32.267827988 CET5003814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:32.272656918 CET14296500383.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:34.265548944 CET14296500383.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:34.265636921 CET5003814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:34.266175985 CET5003814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:34.270976067 CET14296500383.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:34.401427984 CET5003914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:34.406326056 CET14296500393.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:34.406435966 CET5003914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:34.406825066 CET5003914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:34.411581993 CET14296500393.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:36.385584116 CET14296500393.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:36.385653973 CET5003914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:36.385968924 CET5003914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:36.390748024 CET14296500393.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:36.495301008 CET5004014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:36.500138044 CET14296500403.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:36.500267982 CET5004014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:36.500607967 CET5004014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:36.505373955 CET14296500403.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:38.462877989 CET14296500403.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:38.462946892 CET5004014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:38.463426113 CET5004014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:38.468259096 CET14296500403.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:38.573767900 CET5004114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:38.580637932 CET14296500413.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:38.580724955 CET5004114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:38.581163883 CET5004114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:38.587886095 CET14296500413.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:40.561573982 CET14296500413.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:40.561645985 CET5004114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:40.562520027 CET5004114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:40.567388058 CET14296500413.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:40.667527914 CET5004214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:40.672363043 CET14296500423.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:40.672473907 CET5004214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:40.672894001 CET5004214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:40.677661896 CET14296500423.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:42.634170055 CET14296500423.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:42.634242058 CET5004214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:42.634999037 CET5004214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:42.639919996 CET14296500423.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:42.729924917 CET5004314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:42.734875917 CET14296500433.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:42.734966040 CET5004314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:42.735644102 CET5004314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:42.740453005 CET14296500433.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:44.697194099 CET14296500433.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:44.697264910 CET5004314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:44.698082924 CET5004314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:44.702931881 CET14296500433.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:44.776896954 CET5004414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:44.781941891 CET14296500443.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:44.782063007 CET5004414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:44.782650948 CET5004414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:44.787465096 CET14296500443.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:46.746304035 CET14296500443.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:46.746364117 CET5004414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:46.748681068 CET5004414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:46.753568888 CET14296500443.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:46.823550940 CET5004514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:46.828438044 CET14296500453.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:46.828516960 CET5004514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:46.829125881 CET5004514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:46.833895922 CET14296500453.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:48.793862104 CET14296500453.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:48.793922901 CET5004514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:48.794430017 CET5004514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:48.799259901 CET14296500453.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:48.854531050 CET5004614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:48.859427929 CET14296500463.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:48.859494925 CET5004614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:48.859920979 CET5004614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:48.864712000 CET14296500463.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:50.822947025 CET14296500463.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:50.823065996 CET5004614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:50.823609114 CET5004614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:50.828413963 CET14296500463.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:50.887166977 CET5004714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:50.892143965 CET14296500473.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:50.892241955 CET5004714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:50.896126032 CET5004714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:50.900985956 CET14296500473.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:52.888931990 CET14296500473.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:52.889019012 CET5004714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:52.889595985 CET5004714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:52.894445896 CET14296500473.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:52.932784081 CET5004814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:52.937645912 CET14296500483.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:52.937732935 CET5004814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:52.938193083 CET5004814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:52.942996979 CET14296500483.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:54.901396990 CET14296500483.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:54.901457071 CET5004814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:54.902020931 CET5004814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:54.906800985 CET14296500483.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:54.948193073 CET5004914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:54.953033924 CET14296500493.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:54.953103065 CET5004914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:54.953448057 CET5004914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:54.958198071 CET14296500493.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:56.933523893 CET14296500493.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:56.933574915 CET5004914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:56.934099913 CET5004914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:56.938822985 CET14296500493.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:56.981055975 CET5005014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:56.985778093 CET14296500503.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:56.985852003 CET5005014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:56.986231089 CET5005014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:56.990995884 CET14296500503.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:58.947293997 CET14296500503.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:58.947355032 CET5005014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:58.947844982 CET5005014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:58.952608109 CET14296500503.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:58.979614019 CET5005114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:58.984435081 CET14296500513.6.231.193192.168.2.4
                                    Jan 13, 2025 09:46:58.984508991 CET5005114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:58.984849930 CET5005114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:46:58.989697933 CET14296500513.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:00.968730927 CET14296500513.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:00.968792915 CET5005114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:00.969333887 CET5005114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:00.974165916 CET14296500513.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:01.010818958 CET5005214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:01.015635014 CET14296500523.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:01.015701056 CET5005214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:01.016027927 CET5005214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:01.020781994 CET14296500523.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:02.979264975 CET14296500523.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:02.979456902 CET5005214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:02.996769905 CET5005214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:03.001671076 CET14296500523.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:03.079947948 CET5005314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:03.084888935 CET14296500533.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:03.084990978 CET5005314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:03.124545097 CET5005314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:03.129406929 CET14296500533.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:05.095190048 CET14296500533.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:05.095254898 CET5005314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:05.095745087 CET5005314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:05.100474119 CET14296500533.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:05.130630016 CET5005414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:05.135531902 CET14296500543.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:05.135596037 CET5005414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:05.135893106 CET5005414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:05.140666008 CET14296500543.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:07.088138103 CET14296500543.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:07.088216066 CET5005414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:07.088951111 CET5005414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:07.093684912 CET14296500543.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:07.120311022 CET5005514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:07.125230074 CET14296500553.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:07.125355005 CET5005514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:07.125593901 CET5005514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:07.130404949 CET14296500553.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:09.110033989 CET14296500553.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:09.110100031 CET5005514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:09.110557079 CET5005514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:09.118546963 CET14296500553.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:09.136077881 CET5005614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:09.144423962 CET14296500563.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:09.144509077 CET5005614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:09.145239115 CET5005614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:09.153837919 CET14296500563.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:11.104969025 CET14296500563.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:11.105035067 CET5005614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:11.105545044 CET5005614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:11.110276937 CET14296500563.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:11.135617971 CET5005714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:11.341094017 CET14296500573.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:11.341269016 CET5005714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:11.341675043 CET5005714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:11.346391916 CET14296500573.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:13.326677084 CET14296500573.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:13.326756954 CET5005714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:13.327224016 CET5005714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:13.332052946 CET14296500573.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:13.354338884 CET5005814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:13.359215021 CET14296500583.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:13.359309912 CET5005814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:13.359620094 CET5005814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:13.364411116 CET14296500583.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:15.322555065 CET14296500583.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:15.322635889 CET5005814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:15.325345039 CET5005814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:15.330173969 CET14296500583.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:15.339778900 CET5005914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:15.344728947 CET14296500593.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:15.344816923 CET5005914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:15.345118046 CET5005914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:15.349890947 CET14296500593.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:17.345628023 CET14296500593.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:17.345716953 CET5005914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:17.346159935 CET5005914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:17.351007938 CET14296500593.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:17.369951010 CET5006014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:17.374816895 CET14296500603.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:17.374907017 CET5006014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:17.375196934 CET5006014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:17.379888058 CET14296500603.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:19.343578100 CET14296500603.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:19.343698025 CET5006014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:19.344100952 CET5006014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:19.349029064 CET14296500603.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:19.370054960 CET5006114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:19.374866962 CET14296500613.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:19.374958992 CET5006114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:19.375251055 CET5006114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:19.380079985 CET14296500613.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:21.338977098 CET14296500613.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:21.339281082 CET5006114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:21.339415073 CET5006114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:21.344227076 CET14296500613.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:21.354551077 CET5006214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:21.359394073 CET14296500623.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:21.359473944 CET5006214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:21.359836102 CET5006214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:21.364603043 CET14296500623.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:23.324059963 CET14296500623.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:23.324125051 CET5006214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:23.324704885 CET5006214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:23.329433918 CET14296500623.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:23.339219093 CET5006314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:23.344172955 CET14296500633.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:23.344250917 CET5006314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:23.344681978 CET5006314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:23.349394083 CET14296500633.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:25.309458971 CET14296500633.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:25.309524059 CET5006314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:25.310247898 CET5006314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:25.315062046 CET14296500633.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:25.323801994 CET5006414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:25.328632116 CET14296500643.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:25.328716993 CET5006414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:25.329281092 CET5006414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:25.334003925 CET14296500643.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:27.293787003 CET14296500643.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:27.293874979 CET5006414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:27.294392109 CET5006414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:27.299217939 CET14296500643.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:27.307620049 CET5006514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:27.312565088 CET14296500653.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:27.312658072 CET5006514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:27.313095093 CET5006514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:27.317914963 CET14296500653.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:29.297755957 CET14296500653.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:29.297821999 CET5006514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:29.298305035 CET5006514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:29.303078890 CET14296500653.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:29.307590961 CET5006614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:29.312388897 CET14296500663.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:29.312484026 CET5006614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:29.313071966 CET5006614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:29.317871094 CET14296500663.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:31.296478033 CET14296500663.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:31.296561956 CET5006614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:31.297099113 CET5006614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:31.301897049 CET14296500663.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:31.307765007 CET5006714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:31.312597036 CET14296500673.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:31.312674999 CET5006714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:31.313241959 CET5006714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:31.318025112 CET14296500673.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:33.297060966 CET14296500673.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:33.297135115 CET5006714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:33.297585964 CET5006714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:33.302386045 CET14296500673.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:33.307847977 CET5006814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:33.312724113 CET14296500683.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:33.312796116 CET5006814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:33.313247919 CET5006814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:33.318053007 CET14296500683.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:35.280188084 CET14296500683.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:35.280455112 CET5006814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:35.297760963 CET5006814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:35.302619934 CET14296500683.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:35.341274977 CET5006914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:35.346231937 CET14296500693.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:35.346298933 CET5006914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:35.346947908 CET5006914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:35.351742983 CET14296500693.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:37.346713066 CET14296500693.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:37.346787930 CET5006914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:37.347162962 CET5006914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:37.351907969 CET14296500693.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:37.354896069 CET5007014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:37.359718084 CET14296500703.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:37.359874964 CET5007014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:37.360163927 CET5007014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:37.364933014 CET14296500703.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:39.323038101 CET14296500703.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:39.323160887 CET5007014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:39.323600054 CET5007014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:39.328340054 CET14296500703.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:39.338807106 CET5007114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:39.343708038 CET14296500713.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:39.343786001 CET5007114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:39.344075918 CET5007114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:39.348891020 CET14296500713.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:41.307579041 CET14296500713.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:41.307646036 CET5007114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:41.308059931 CET5007114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:41.312777996 CET14296500713.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:41.323113918 CET5007214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:41.328025103 CET14296500723.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:41.328088999 CET5007214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:41.328404903 CET5007214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:41.333170891 CET14296500723.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:43.314723015 CET14296500723.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:43.314795017 CET5007214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:43.315325022 CET5007214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:43.320099115 CET14296500723.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:43.323280096 CET5007314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:43.328116894 CET14296500733.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:43.328188896 CET5007314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:43.328552961 CET5007314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:43.333374977 CET14296500733.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:45.291482925 CET14296500733.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:45.291604042 CET5007314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:45.291970015 CET5007314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:45.296916962 CET14296500733.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:45.307301998 CET5007414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:45.312199116 CET14296500743.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:45.312298059 CET5007414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:45.312509060 CET5007414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:45.317251921 CET14296500743.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:47.282727003 CET14296500743.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:47.282818079 CET5007414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:47.284363031 CET5007414296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:47.289271116 CET14296500743.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:47.297235012 CET5007514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:47.302087069 CET14296500753.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:47.302155018 CET5007514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:47.302614927 CET5007514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:47.307384968 CET14296500753.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:49.263223886 CET14296500753.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:49.263300896 CET5007514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:49.263803959 CET5007514296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:49.268724918 CET14296500753.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:49.276307106 CET5007614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:49.281362057 CET14296500763.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:49.281441927 CET5007614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:49.281811953 CET5007614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:49.286716938 CET14296500763.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:51.245496988 CET14296500763.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:51.245569944 CET5007614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:51.246265888 CET5007614296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:51.251123905 CET14296500763.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:51.261568069 CET5007714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:51.266422033 CET14296500773.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:51.266491890 CET5007714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:51.267246008 CET5007714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:51.272001028 CET14296500773.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:53.249952078 CET14296500773.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:53.250017881 CET5007714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:53.250519037 CET5007714296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:53.255306005 CET14296500773.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:53.260703087 CET5007814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:53.265527964 CET14296500783.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:53.265603065 CET5007814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:53.265974998 CET5007814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:53.270767927 CET14296500783.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:55.229995966 CET14296500783.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:55.230062962 CET5007814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:55.231349945 CET5007814296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:55.236196995 CET14296500783.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:55.246161938 CET5007914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:55.251060009 CET14296500793.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:55.251131058 CET5007914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:55.251466036 CET5007914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:55.256257057 CET14296500793.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:57.214597940 CET14296500793.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:57.214653015 CET5007914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:57.215390921 CET5007914296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:57.220212936 CET14296500793.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:57.229779005 CET5008014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:57.234704971 CET14296500803.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:57.234778881 CET5008014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:57.235174894 CET5008014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:57.239979029 CET14296500803.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:59.235627890 CET14296500803.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:59.235691071 CET5008014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:59.236145973 CET5008014296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:59.241056919 CET14296500803.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:59.245049953 CET5008114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:59.250140905 CET14296500813.6.231.193192.168.2.4
                                    Jan 13, 2025 09:47:59.250216961 CET5008114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:59.250571966 CET5008114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:47:59.255474091 CET14296500813.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:01.216120005 CET14296500813.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:01.216197014 CET5008114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:01.216805935 CET5008114296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:01.221767902 CET14296500813.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:01.229619980 CET5008214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:01.234572887 CET14296500823.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:01.234638929 CET5008214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:01.235157967 CET5008214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:01.240020990 CET14296500823.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:03.200381041 CET14296500823.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:03.200450897 CET5008214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:03.203919888 CET5008214296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:03.208751917 CET14296500823.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:03.214121103 CET5008314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:03.219070911 CET14296500833.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:03.219161987 CET5008314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:03.219619036 CET5008314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:03.224463940 CET14296500833.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:05.203879118 CET14296500833.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:05.203984022 CET5008314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:05.204449892 CET5008314296192.168.2.43.6.231.193
                                    Jan 13, 2025 09:48:05.209357977 CET14296500833.6.231.193192.168.2.4
                                    Jan 13, 2025 09:48:05.230204105 CET5008414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:05.235187054 CET142965008413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:05.235294104 CET5008414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:05.235701084 CET5008414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:05.240525961 CET142965008413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:07.219774961 CET142965008413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:07.219916105 CET5008414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:07.220293045 CET5008414296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:07.221183062 CET5008514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:07.225054979 CET142965008413.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:07.226006985 CET142965008513.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:07.226125002 CET5008514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:07.226377964 CET5008514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:07.231235981 CET142965008513.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:09.220601082 CET142965008513.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:09.224435091 CET5008514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:09.226172924 CET5008514296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:09.226175070 CET5008614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:09.231302977 CET142965008513.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:09.231360912 CET142965008613.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:09.231489897 CET5008614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:09.232717037 CET5008614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:09.237539053 CET142965008613.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:11.201199055 CET142965008613.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:11.204302073 CET5008614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:11.204653025 CET5008614296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:11.208281040 CET5008714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:11.209574938 CET142965008613.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:11.213224888 CET142965008713.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:11.216636896 CET5008714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:11.216636896 CET5008714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:11.221582890 CET142965008713.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:13.187412024 CET142965008713.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:13.190404892 CET5008714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:13.191267014 CET5008714296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:13.194256067 CET5008814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:13.196173906 CET142965008713.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:13.199146032 CET142965008813.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:13.199516058 CET5008814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:13.199711084 CET5008814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:13.204499006 CET142965008813.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:15.152138948 CET142965008813.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:15.156455994 CET5008814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:15.156749964 CET5008814296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:15.159234047 CET5008914296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:15.161679029 CET142965008813.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:15.164097071 CET142965008913.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:15.166599989 CET5008914296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:15.167028904 CET5008914296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:15.171860933 CET142965008913.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:17.140729904 CET142965008913.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:17.140887022 CET5008914296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:17.141228914 CET5008914296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:17.143260956 CET5009014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:17.145936966 CET142965008913.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:17.148133039 CET142965009013.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:17.148497105 CET5009014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:17.149068117 CET5009014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:17.153808117 CET142965009013.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:19.107763052 CET142965009013.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:19.108216047 CET5009014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:19.109589100 CET5009114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:19.110269070 CET5009014296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:19.116343975 CET142965009113.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:19.116503000 CET142965009013.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:19.116894960 CET5009114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:19.116894960 CET5009114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:19.123631001 CET142965009113.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:21.092592955 CET142965009113.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:21.092730045 CET5009114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:21.114295006 CET5009114296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:21.119163990 CET142965009113.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:24.417969942 CET5009214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:24.422914028 CET142965009213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:24.423064947 CET5009214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:24.423381090 CET5009214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:24.428183079 CET142965009213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:26.402666092 CET142965009213.202.226.61192.168.2.4
                                    Jan 13, 2025 09:48:26.404684067 CET5009214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:26.404684067 CET5009214296192.168.2.413.202.226.61
                                    Jan 13, 2025 09:48:26.410273075 CET142965009213.202.226.61192.168.2.4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 13, 2025 09:44:17.382467031 CET5606553192.168.2.41.1.1.1
                                    Jan 13, 2025 09:44:17.399288893 CET53560651.1.1.1192.168.2.4
                                    Jan 13, 2025 09:45:17.916654110 CET5161653192.168.2.41.1.1.1
                                    Jan 13, 2025 09:45:17.923825979 CET53516161.1.1.1192.168.2.4
                                    Jan 13, 2025 09:46:04.260328054 CET5223453192.168.2.41.1.1.1
                                    Jan 13, 2025 09:46:04.277295113 CET53522341.1.1.1192.168.2.4
                                    Jan 13, 2025 09:47:05.119776964 CET5873253192.168.2.41.1.1.1
                                    Jan 13, 2025 09:47:05.129661083 CET53587321.1.1.1192.168.2.4
                                    Jan 13, 2025 09:48:05.213515043 CET5421853192.168.2.41.1.1.1
                                    Jan 13, 2025 09:48:05.229237080 CET53542181.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 13, 2025 09:44:17.382467031 CET192.168.2.41.1.1.10xe60cStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    Jan 13, 2025 09:45:17.916654110 CET192.168.2.41.1.1.10x3fb4Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    Jan 13, 2025 09:46:04.260328054 CET192.168.2.41.1.1.10xbcb1Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    Jan 13, 2025 09:47:05.119776964 CET192.168.2.41.1.1.10x2b9fStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    Jan 13, 2025 09:48:05.213515043 CET192.168.2.41.1.1.10x1a2bStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 13, 2025 09:44:17.399288893 CET1.1.1.1192.168.2.40xe60cNo error (0)0.tcp.in.ngrok.io3.6.231.193A (IP address)IN (0x0001)false
                                    Jan 13, 2025 09:45:17.923825979 CET1.1.1.1192.168.2.40x3fb4No error (0)0.tcp.in.ngrok.io13.202.226.61A (IP address)IN (0x0001)false
                                    Jan 13, 2025 09:46:04.277295113 CET1.1.1.1192.168.2.40xbcb1No error (0)0.tcp.in.ngrok.io3.6.231.193A (IP address)IN (0x0001)false
                                    Jan 13, 2025 09:47:05.129661083 CET1.1.1.1192.168.2.40x2b9fNo error (0)0.tcp.in.ngrok.io3.6.231.193A (IP address)IN (0x0001)false
                                    Jan 13, 2025 09:48:05.229237080 CET1.1.1.1192.168.2.40x1a2bNo error (0)0.tcp.in.ngrok.io13.202.226.61A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:03:44:13
                                    Start date:13/01/2025
                                    Path:C:\Users\user\Desktop\Client-base.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\Client-base.exe"
                                    Imagebase:0x500000
                                    File size:3'266'048 bytes
                                    MD5 hash:21CE4CD2CE246C86222B57B93CDC92BD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1758259602.0000000000820000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.4214131861.0000000002B31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1757918698.0000000000502000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Target ID:1
                                    Start time:03:44:15
                                    Start date:13/01/2025
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                    Imagebase:0x7ff76f990000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.1775574902.000002140D1E0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.1775347331.000000207E7F9000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.1775529562.000002140CEF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.1775529562.000002140CEF8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.1775574902.000002140D1E5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:03:44:15
                                    Start date:13/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:11%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:15
                                      Total number of Limit Nodes:1
                                      execution_graph 12710 7ffd9b6f3525 12711 7ffd9b6f3531 12710->12711 12712 7ffd9b6f34d7 12711->12712 12713 7ffd9b6f3607 DeleteFileW 12711->12713 12714 7ffd9b6f3616 12713->12714 12700 7ffd9b96e709 12702 7ffd9b96e71f 12700->12702 12701 7ffd9b96e7cb 12702->12701 12703 7ffd9b96e8c4 SetWindowsHookExW 12702->12703 12704 7ffd9b96e906 12703->12704 12705 7ffd9b6f3650 12706 7ffd9b6f3659 12705->12706 12707 7ffd9b6f3607 DeleteFileW 12706->12707 12709 7ffd9b6f366c 12706->12709 12708 7ffd9b6f3616 12707->12708
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4221058239.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b960000_Client-base.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 49f6a2a3050315c2a41ea7c0607e12f988c97c3a643be40a56bd3ab918a094d4
                                      • Instruction ID: e22d8e836af8d31ced04c4641e225bd9d9c55c873ca4a3030ecef2b8def879c3
                                      • Opcode Fuzzy Hash: 49f6a2a3050315c2a41ea7c0607e12f988c97c3a643be40a56bd3ab918a094d4
                                      • Instruction Fuzzy Hash: FFF2A170A29A0D8FDFA8DF68C4A4BA977E1FF58300F1141A9D44ED72A6DE35E941CB40

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 620 7ffd9b969bd1-7ffd9b969c19 622 7ffd9b969c1b-7ffd9b969c29 620->622 623 7ffd9b969c2a-7ffd9b969c3c 620->623 625 7ffd9b969c42-7ffd9b969c52 623->625 626 7ffd9b969cbf-7ffd9b969cc3 623->626 634 7ffd9b969f3b-7ffd9b969f8a 625->634 635 7ffd9b969c58-7ffd9b969ca7 625->635 627 7ffd9b969cdb-7ffd9b969cdf 626->627 628 7ffd9b969cc5-7ffd9b969cc9 626->628 630 7ffd9b969ce1-7ffd9b969d08 627->630 631 7ffd9b969d0e-7ffd9b969d12 627->631 636 7ffd9b969cd0-7ffd9b969cd4 628->636 630->631 640 7ffd9b969f91-7ffd9b969fa9 630->640 632 7ffd9b969f2c-7ffd9b969f3a 631->632 633 7ffd9b969d18-7ffd9b969d1d 631->633 633->632 638 7ffd9b969d23-7ffd9b969d2d 633->638 634->640 670 7ffd9b969cb4-7ffd9b969cb8 635->670 671 7ffd9b969ca9-7ffd9b969cb2 635->671 636->627 645 7ffd9b969d2f-7ffd9b969d41 638->645 646 7ffd9b969d7b-7ffd9b969d80 638->646 658 7ffd9b969fab-7ffd9b969fb1 640->658 659 7ffd9b969fb5 640->659 645->646 660 7ffd9b969d43-7ffd9b969d6e 645->660 650 7ffd9b969f08-7ffd9b969f0d 646->650 651 7ffd9b969d86-7ffd9b969d90 646->651 650->632 653 7ffd9b969f0f-7ffd9b969f24 650->653 651->650 661 7ffd9b969d96-7ffd9b969da8 651->661 653->632 667 7ffd9b969f26-7ffd9b969f29 653->667 663 7ffd9b969fb3 658->663 664 7ffd9b969fb9-7ffd9b96a018 658->664 659->664 665 7ffd9b969fb7 659->665 660->646 678 7ffd9b969d70-7ffd9b969d74 660->678 673 7ffd9b969e9e-7ffd9b969ea9 661->673 674 7ffd9b969dae-7ffd9b969df3 661->674 663->659 683 7ffd9b96a5be-7ffd9b96a5d0 664->683 684 7ffd9b96a01e-7ffd9b96a030 664->684 665->664 667->632 670->626 671->626 681 7ffd9b969e30-7ffd9b969e57 673->681 682 7ffd9b969eab-7ffd9b969f01 673->682 674->673 698 7ffd9b969df9-7ffd9b969e10 674->698 678->646 681->673 694 7ffd9b969e59-7ffd9b969e6d 681->694 682->650 684->683 691 7ffd9b96a036-7ffd9b96a06f 684->691 691->683 704 7ffd9b96a075-7ffd9b96a0b6 691->704 708 7ffd9b96a0bc-7ffd9b96a0d4 704->708 709 7ffd9b96a168-7ffd9b96a17b 704->709 712 7ffd9b96a15c-7ffd9b96a162 708->712 713 7ffd9b96a0da-7ffd9b96a0fa 708->713 714 7ffd9b96a1d0 709->714 715 7ffd9b96a17d-7ffd9b96a19e 709->715 712->708 712->709 713->712 727 7ffd9b96a0fc-7ffd9b96a10e 713->727 716 7ffd9b96a1d2-7ffd9b96a1d7 714->716 721 7ffd9b96a1a0-7ffd9b96a1c7 715->721 722 7ffd9b96a1c9-7ffd9b96a1ce 715->722 717 7ffd9b96a21e-7ffd9b96a241 716->717 718 7ffd9b96a1d9-7ffd9b96a1e0 716->718 728 7ffd9b96a337-7ffd9b96a343 717->728 729 7ffd9b96a247-7ffd9b96a26f 717->729 723 7ffd9b96a1e7-7ffd9b96a201 718->723 721->716 722->716 723->717 733 7ffd9b96a203-7ffd9b96a21c 723->733 727->712 735 7ffd9b96a110-7ffd9b96a114 727->735 728->683 731 7ffd9b96a349-7ffd9b96a35e 728->731 740 7ffd9b96a32b-7ffd9b96a331 729->740 741 7ffd9b96a275-7ffd9b96a290 729->741 731->683 733->717 738 7ffd9b96a5d1-7ffd9b96a673 735->738 739 7ffd9b96a11a-7ffd9b96a12f 735->739 751 7ffd9b96a679-7ffd9b96a67b 738->751 752 7ffd9b96a785-7ffd9b96a791 738->752 746 7ffd9b96a136-7ffd9b96a138 739->746 740->728 740->729 741->740 753 7ffd9b96a296-7ffd9b96a2a8 741->753 746->712 747 7ffd9b96a13a-7ffd9b96a158 call 7ffd9b9653c0 746->747 747->712 755 7ffd9b96a67d-7ffd9b96a68f 751->755 756 7ffd9b96a695-7ffd9b96a6a3 751->756 761 7ffd9b96a793-7ffd9b96a7b8 752->761 762 7ffd9b96a7ba 752->762 753->740 766 7ffd9b96a2ae-7ffd9b96a2b2 753->766 755->756 768 7ffd9b96a7bf-7ffd9b96a7f1 755->768 759 7ffd9b96a6a9-7ffd9b96a6c0 756->759 760 7ffd9b96a7f8-7ffd9b96a82b 756->760 779 7ffd9b96a6c2-7ffd9b96a6d4 759->779 780 7ffd9b96a6da-7ffd9b96a6dd 759->780 784 7ffd9b96a832-7ffd9b96a83e 760->784 761->762 762->768 766->738 770 7ffd9b96a2b8-7ffd9b96a2fb 766->770 768->760 770->740 798 7ffd9b96a2fd-7ffd9b96a328 call 7ffd9b9653c0 770->798 779->780 779->784 781 7ffd9b96a6df-7ffd9b96a6f6 780->781 782 7ffd9b96a706-7ffd9b96a722 call 7ffd9b967a50 780->782 781->782 807 7ffd9b96a6f8-7ffd9b96a6fc 781->807 802 7ffd9b96a753-7ffd9b96a757 782->802 803 7ffd9b96a724-7ffd9b96a752 782->803 788 7ffd9b96a840-7ffd9b96a864 784->788 789 7ffd9b96a867 784->789 788->789 795 7ffd9b96a87b 789->795 796 7ffd9b96a869-7ffd9b96a871 789->796 800 7ffd9b96a87d 795->800 799 7ffd9b96a873-7ffd9b96a879 796->799 796->800 798->740 799->795 805 7ffd9b96a881-7ffd9b96a8bc 799->805 800->805 806 7ffd9b96a87f 800->806 811 7ffd9b96a75e-7ffd9b96a784 802->811 814 7ffd9b96a8ff-7ffd9b96a932 805->814 815 7ffd9b96a8be-7ffd9b96a8e5 805->815 806->805 813 7ffd9b96a703-7ffd9b96a704 807->813 813->782 825 7ffd9b96a939-7ffd9b96a981 814->825 815->825 826 7ffd9b96a8e7-7ffd9b96a8fe 815->826 833 7ffd9b96a983 825->833 834 7ffd9b96a985-7ffd9b96a9a7 825->834 833->834 835 7ffd9b96a9c5-7ffd9b96a9ca 833->835 837 7ffd9b96a9ad-7ffd9b96a9bf 834->837 838 7ffd9b96aa8a-7ffd9b96aa96 834->838 844 7ffd9b96a9c1-7ffd9b96a9c4 837->844 845 7ffd9b96a9cb-7ffd9b96a9e3 call 7ffd9b9640b0 837->845 840 7ffd9b96aabf-7ffd9b96aad3 838->840 841 7ffd9b96aa98-7ffd9b96aabd 838->841 850 7ffd9b96ab15-7ffd9b96ab17 840->850 851 7ffd9b96aad5-7ffd9b96aaf2 840->851 841->840 844->835 852 7ffd9b96aa47-7ffd9b96aa50 845->852 853 7ffd9b96a9e5-7ffd9b96aa16 845->853 855 7ffd9b96ab19-7ffd9b96ab1b 850->855 854 7ffd9b96aaf4-7ffd9b96ab0f 851->854 851->855 862 7ffd9b96aa41-7ffd9b96aa45 853->862 863 7ffd9b96aa18-7ffd9b96aa3f 853->863 854->855 856 7ffd9b96ab11-7ffd9b96ab12 854->856 857 7ffd9b96ab1d-7ffd9b96ab2b 855->857 858 7ffd9b96ab2c-7ffd9b96ab3c 855->858 856->850 862->852 862->853 863->862 865 7ffd9b96aa51-7ffd9b96aa89 863->865
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4221058239.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b960000_Client-base.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a324fa52688d6b0dff4f7ca7149c24b973deca26552b1f504899cae0a50b266e
                                      • Instruction ID: d47ba7d908467eb433292091b2df9a88d430676336dafe00bcdc967eebf92166
                                      • Opcode Fuzzy Hash: a324fa52688d6b0dff4f7ca7149c24b973deca26552b1f504899cae0a50b266e
                                      • Instruction Fuzzy Hash: 21921A31B1D94D8FEBA8EB6C9465A7937D1EF99310F0500BAE44EC72E6DE24EC428741

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 881 7ffd9b96afdd-7ffd9b96b079 883 7ffd9b96b6f1-7ffd9b96b706 881->883 884 7ffd9b96b07f-7ffd9b96b082 881->884 884->883 885 7ffd9b96b088-7ffd9b96b0a5 884->885 885->883 887 7ffd9b96b0ab-7ffd9b96b0ca 885->887 889 7ffd9b96b0cc-7ffd9b96b0cf 887->889 890 7ffd9b96b0d6-7ffd9b96b0e9 887->890 891 7ffd9b96b0d1 889->891 892 7ffd9b96b0ee-7ffd9b96b11e 889->892 893 7ffd9b96b179-7ffd9b96b18b 890->893 891->883 892->883 898 7ffd9b96b124-7ffd9b96b172 892->898 893->883 896 7ffd9b96b191-7ffd9b96b1d0 893->896 896->883 903 7ffd9b96b1d6-7ffd9b96b1e0 896->903 898->893 906 7ffd9b96b1e2-7ffd9b96b1f6 903->906 907 7ffd9b96b1f8-7ffd9b96b208 903->907 910 7ffd9b96b212-7ffd9b96b267 906->910 907->910 914 7ffd9b96b26d-7ffd9b96b275 910->914 915 7ffd9b96b2db-7ffd9b96b2e3 914->915 916 7ffd9b96b277-7ffd9b96b28b 914->916 915->883 917 7ffd9b96b2e9-7ffd9b96b30b 915->917 916->915 920 7ffd9b96b28d-7ffd9b96b2d7 916->920 921 7ffd9b96b311-7ffd9b96b33a 917->921 922 7ffd9b96b40f-7ffd9b96b41a 917->922 920->915 928 7ffd9b96b3c1-7ffd9b96b3e2 921->928 929 7ffd9b96b340-7ffd9b96b366 921->929 925 7ffd9b96b48c-7ffd9b96b4b5 922->925 926 7ffd9b96b41c-7ffd9b96b445 922->926 943 7ffd9b96b4b7-7ffd9b96b4d1 925->943 944 7ffd9b96b4d8-7ffd9b96b4e5 925->944 926->883 939 7ffd9b96b44b-7ffd9b96b45d 926->939 928->921 933 7ffd9b96b3e8 928->933 929->928 942 7ffd9b96b368-7ffd9b96b37e 929->942 933->922 939->883 947 7ffd9b96b463-7ffd9b96b481 939->947 942->928 948 7ffd9b96b380-7ffd9b96b398 942->948 943->944 952 7ffd9b96b4eb-7ffd9b96b518 944->952 953 7ffd9b96b5aa-7ffd9b96b5ca 944->953 947->883 961 7ffd9b96b487-7ffd9b96b488 947->961 948->928 955 7ffd9b96b39a-7ffd9b96b3bf 948->955 967 7ffd9b96b53b-7ffd9b96b547 952->967 968 7ffd9b96b51a-7ffd9b96b534 952->968 959 7ffd9b96b5d4-7ffd9b96b610 953->959 960 7ffd9b96b5cc-7ffd9b96b5cd 953->960 955->928 964 7ffd9b96b3ea-7ffd9b96b408 955->964 959->883 974 7ffd9b96b616-7ffd9b96b633 959->974 960->959 961->925 964->922 975 7ffd9b96b549-7ffd9b96b555 967->975 976 7ffd9b96b598-7ffd9b96b5a4 967->976 968->967 982 7ffd9b96b63d-7ffd9b96b678 974->982 983 7ffd9b96b635-7ffd9b96b636 974->983 977 7ffd9b96b840-7ffd9b96b857 975->977 978 7ffd9b96b55b-7ffd9b96b591 975->978 976->883 976->953 985 7ffd9b96b861-7ffd9b96b8cf call 7ffd9b965070 call 7ffd9b967d70 call 7ffd9b965370 call 7ffd9b96b8d0 977->985 986 7ffd9b96b859-7ffd9b96b860 977->986 978->976 982->883 998 7ffd9b96b67a-7ffd9b96b68c 982->998 983->982 986->985 998->883 1002 7ffd9b96b68e-7ffd9b96b6ac 998->1002 1002->883 1005 7ffd9b96b6ae-7ffd9b96b6ca 1002->1005 1008 7ffd9b96b6cc-7ffd9b96b6ef 1005->1008 1009 7ffd9b96b707-7ffd9b96b77c 1005->1009 1008->883 1008->1009 1019 7ffd9b96b782-7ffd9b96b78b 1009->1019 1020 7ffd9b96b827-7ffd9b96b83f 1009->1020 1019->1020
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4221058239.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b960000_Client-base.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b65af8ffc74d2db9b140c57d5f4ec36c9faacd75a1bd6b4df78a931521c1f9f9
                                      • Instruction ID: 6946cec38ebdc2eccec085c1768c56de935b16edf9be79614801ff2b1504815f
                                      • Opcode Fuzzy Hash: b65af8ffc74d2db9b140c57d5f4ec36c9faacd75a1bd6b4df78a931521c1f9f9
                                      • Instruction Fuzzy Hash: D3528330B18A098FDB98EB2CC4A5B6977E1FF99300F5545B9E44EC72A6DE34E841CB41

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1022 7ffd9b969271-7ffd9b969295 1023 7ffd9b9692df-7ffd9b9692e2 1022->1023 1024 7ffd9b969297-7ffd9b9692bc 1022->1024 1025 7ffd9b9692d0-7ffd9b9692de 1024->1025 1026 7ffd9b9692be-7ffd9b9692ce 1024->1026 1025->1023 1026->1025 1028 7ffd9b9692e3-7ffd9b969314 1026->1028 1031 7ffd9b969363-7ffd9b969388 call 7ffd9b967e00 1028->1031 1032 7ffd9b969316-7ffd9b969335 call 7ffd9b963950 1028->1032 1037 7ffd9b9695f2-7ffd9b969605 call 7ffd9b968d80 1031->1037 1038 7ffd9b96938e-7ffd9b96939c call 7ffd9b964e50 1031->1038 1032->1031 1039 7ffd9b969337-7ffd9b969357 call 7ffd9b963830 1032->1039 1049 7ffd9b969632-7ffd9b969634 1037->1049 1050 7ffd9b969607-7ffd9b969628 1037->1050 1047 7ffd9b96939e-7ffd9b9693b2 1038->1047 1048 7ffd9b9693b6-7ffd9b9693b9 1038->1048 1039->1031 1046 7ffd9b969359-7ffd9b969360 1039->1046 1046->1031 1047->1048 1053 7ffd9b969583-7ffd9b96958e 1048->1053 1054 7ffd9b9693bf-7ffd9b9693c2 1048->1054 1051 7ffd9b969643-7ffd9b9696c6 1049->1051 1052 7ffd9b969636-7ffd9b96963a 1049->1052 1050->1049 1064 7ffd9b96962a-7ffd9b96962f 1050->1064 1069 7ffd9b9696ce-7ffd9b9696cf 1051->1069 1052->1051 1055 7ffd9b96963c-7ffd9b96963e 1052->1055 1058 7ffd9b9695c5-7ffd9b9695d0 1053->1058 1057 7ffd9b9693c8 1054->1057 1054->1058 1062 7ffd9b9696d5-7ffd9b9696d8 1055->1062 1057->1037 1058->1037 1065 7ffd9b9696de-7ffd9b969751 call 7ffd9b968060 1062->1065 1066 7ffd9b969ac7-7ffd9b969ada 1062->1066 1064->1049 1076 7ffd9b969753-7ffd9b969774 1065->1076 1077 7ffd9b969776 1065->1077 1069->1062 1076->1077 1078 7ffd9b969778-7ffd9b96978b 1076->1078 1077->1078 1081 7ffd9b96978d-7ffd9b9697b6 1078->1081 1082 7ffd9b9697bb-7ffd9b9697f4 1078->1082 1089 7ffd9b969870-7ffd9b969877 1081->1089 1087 7ffd9b9697fe-7ffd9b96982a 1082->1087 1088 7ffd9b9697f6-7ffd9b9697f7 1082->1088 1087->1089 1097 7ffd9b96982c-7ffd9b969860 1087->1097 1088->1087 1090 7ffd9b969893-7ffd9b9698f4 1089->1090 1091 7ffd9b969879-7ffd9b969885 1089->1091 1100 7ffd9b969915-7ffd9b969937 1090->1100 1101 7ffd9b9698f6-7ffd9b96990b 1090->1101 1091->1090 1093 7ffd9b969887-7ffd9b96988c 1091->1093 1093->1090 1097->1089 1105 7ffd9b969862-7ffd9b969869 1097->1105 1106 7ffd9b969953-7ffd9b969954 1100->1106 1107 7ffd9b969939-7ffd9b969945 1100->1107 1101->1100 1105->1089 1108 7ffd9b969956-7ffd9b969971 1106->1108 1109 7ffd9b96994d-7ffd9b969951 1107->1109 1108->1066 1111 7ffd9b969977-7ffd9b96998d call 7ffd9b968d80 1108->1111 1109->1108 1111->1066 1114 7ffd9b969993-7ffd9b9699b4 1111->1114 1116 7ffd9b969a01-7ffd9b969a22 1114->1116 1117 7ffd9b9699b6-7ffd9b9699e4 1114->1117 1122 7ffd9b969a64-7ffd9b969a85 1116->1122 1123 7ffd9b969a24-7ffd9b969a56 1116->1123 1117->1116 1121 7ffd9b9699e6-7ffd9b9699fc 1117->1121 1121->1066 1122->1066 1128 7ffd9b969a87-7ffd9b969ab9 1122->1128 1123->1122 1129 7ffd9b969a58-7ffd9b969a61 1123->1129 1128->1066 1133 7ffd9b969abb-7ffd9b969ac4 1128->1133 1129->1122 1133->1066
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4221058239.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b960000_Client-base.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8bf72161808d3740b3135d5656ec1537297a26539570472ffba87852f2160150
                                      • Instruction ID: a834d04f310f7693f79d00569b7441a41dd32a5ef3dc31c954625fc9ac6eb3d5
                                      • Opcode Fuzzy Hash: 8bf72161808d3740b3135d5656ec1537297a26539570472ffba87852f2160150
                                      • Instruction Fuzzy Hash: 6E226E30B19A0D8FEBA8DB5C84A97B977E2FF99300F15417DD44EC72E6CE24A9428741
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4221058239.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b960000_Client-base.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b7655b1b1181c7515ee3e87c73a1bb9ae8fa4920023244b73f9fa54726c28932
                                      • Instruction ID: 452af31ec9f9218b50cd2fa5b3ced6c10414e109f6c2ad9be5bfe8aa22beefef
                                      • Opcode Fuzzy Hash: b7655b1b1181c7515ee3e87c73a1bb9ae8fa4920023244b73f9fa54726c28932
                                      • Instruction Fuzzy Hash: D5025C30E28A1D8FEBA8DF58C4957A977E1FF98301F1541B9D44ED32A6DE34B9818B40

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4221058239.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b960000_Client-base.jbxd
                                      Similarity
                                      • API ID: HookWindows
                                      • String ID:
                                      • API String ID: 2559412058-0
                                      • Opcode ID: 99ae63ee70a1eadb7d1d94ae2b987fdf401795f4216e64265aca81256060e402
                                      • Instruction ID: 61350dae44721f3c9731c2ee0851ca4fc1f2465a520bf0165fa1e6878e3f30c3
                                      • Opcode Fuzzy Hash: 99ae63ee70a1eadb7d1d94ae2b987fdf401795f4216e64265aca81256060e402
                                      • Instruction Fuzzy Hash: 24711631B1DE4D5FDB58AB6C98A65F97BE1EF59310B0401BED04AC31A3DE24AC4687C1

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4218982860.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b6f0000_Client-base.jbxd
                                      Similarity
                                      • API ID: DeleteFile
                                      • String ID:
                                      • API String ID: 4033686569-0
                                      • Opcode ID: c93a2fdc3b849aad5451cd9398253a702176410a537a0d09f18157913813a0dc
                                      • Instruction ID: 6b35aaf149cfac7965dc5dfea57002472ace1e2fdf9211a16454cd7692017de1
                                      • Opcode Fuzzy Hash: c93a2fdc3b849aad5451cd9398253a702176410a537a0d09f18157913813a0dc
                                      • Instruction Fuzzy Hash: E3511631A0DB4C4FDB59DB6C8895AF9BFE1EF65310F0442BFD049C72A2CA24A9458781

                                      Control-flow Graph

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4218982860.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b6f0000_Client-base.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d10b566bd4692e0bfaa13e4b17104d40eecc134af6ace87b01dbaceae420d18b
                                      • Instruction ID: c9dded09cf63d031ce6c10a2740a823d8f4282a6212a0cba7c7a5feaafef1b2d
                                      • Opcode Fuzzy Hash: d10b566bd4692e0bfaa13e4b17104d40eecc134af6ace87b01dbaceae420d18b
                                      • Instruction Fuzzy Hash: 3B313571F0D64A4EEB24ABA894262F9BBE1EF41310F00027ED069C72D6CF69B9458781

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 559 7ffd9b6f3569-7ffd9b6f35d8 564 7ffd9b6f35da-7ffd9b6f35df 559->564 565 7ffd9b6f35e2-7ffd9b6f3614 DeleteFileW 559->565 564->565 567 7ffd9b6f361c-7ffd9b6f364a 565->567 568 7ffd9b6f3616 565->568 568->567
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4218982860.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b6f0000_Client-base.jbxd
                                      Similarity
                                      • API ID: DeleteFile
                                      • String ID:
                                      • API String ID: 4033686569-0
                                      • Opcode ID: 870106628b2b55c3a43b3c29b321dbfc901a85682413f788b718bed1f9432b96
                                      • Instruction ID: 16383bbfc94b01492328a291435ae14587b806f391e62c27bee741f419bb00de
                                      • Opcode Fuzzy Hash: 870106628b2b55c3a43b3c29b321dbfc901a85682413f788b718bed1f9432b96
                                      • Instruction Fuzzy Hash: 0D31C13190DB5C8FDB19DB588859AE9BBF0FF65310F04426FD049D7292DB74A805CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4218982860.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b6f0000_Client-base.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &N_^
                                      • API String ID: 0-1877586524
                                      • Opcode ID: 23a0b35c5221b0a2191e0c7560c4ddd6eb14daf95e19646a51ef908dff3500b9
                                      • Instruction ID: e98e336fadf568b84694c690b7a41ab6f0a6d32eb3e5abc1aae1d557a9ec9d84
                                      • Opcode Fuzzy Hash: 23a0b35c5221b0a2191e0c7560c4ddd6eb14daf95e19646a51ef908dff3500b9
                                      • Instruction Fuzzy Hash: 6B227F16B0D1A30AE30677BC78B29EA7FA0CF4227974C41F7D1ED8D0D79C0D244A82A6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4218982860.00007FFD9B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b6f0000_Client-base.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f649c12657db36e1625a39495238a8e5e75b9b252a87d7026386d37b8ec167bf
                                      • Instruction ID: 0bd2ca51c7429e4a8ca198cb475bee7c09eb08c427a759ecb03e4fdfbd23c700
                                      • Opcode Fuzzy Hash: f649c12657db36e1625a39495238a8e5e75b9b252a87d7026386d37b8ec167bf
                                      • Instruction Fuzzy Hash: 17310517B0E1A316F717B3BC74F29E63BA09F5223974841F7D19D4D0E79C0D688A4296